0% found this document useful (0 votes)
5 views210 pages

AD1

The report generated by Tenable Nessus identifies multiple vulnerabilities on the host AD01.tayninh.dcs.vn, including issues with SSL medium strength cipher suites, untrusted SSL certificates, and outdated TLS protocols. The vulnerabilities are categorized with risk factors ranging from medium to high, and solutions are provided for each issue, such as reconfiguring SSL settings and enabling Network Level Authentication. The report emphasizes the importance of addressing these vulnerabilities to prevent potential security breaches.

Uploaded by

Nguyen Ngoc Son
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views210 pages

AD1

The report generated by Tenable Nessus identifies multiple vulnerabilities on the host AD01.tayninh.dcs.vn, including issues with SSL medium strength cipher suites, untrusted SSL certificates, and outdated TLS protocols. The vulnerabilities are categorized with risk factors ranging from medium to high, and solutions are provided for each issue, such as reconfiguring SSL settings and enabling Network Level Authentication. The report emphasizes the importance of addressing these vulnerabilities to prevent potential security breaches.

Uploaded by

Nguyen Ngoc Son
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 210

12/13/24, 4:22 PM AD1

Report generated by Tenable Nessus™

AD1
Fri, 13 Dec 2024 16:14:01 SE Asia Standard Time

TABLE OF CONTENTS

Vulnerabilities by Host
AD01.tayninh.dcs.vn

Vulnerabilities by Host Collapse All | Expand All

AD01.tayninh.dcs.vn

0 1 6 0 77
CRITICAL HIGH MEDIUM LOW INFO

Scan Information

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 1/210
12/13/24, 4:22 PM AD1

Start time: Fri Dec 13 16:05:35 2024


End time: Fri Dec 13 16:14:01 2024

Host Information

DNS Name: AD01.tayninh.dcs.vn


Netbios Name: AD01
IP: 10.184.234.79
OS: Microsoft Windows

Vulnerabilities

42873 - SSL Medium Strength Cipher Suites Supported (SWEET32) -

Synopsis
The remote service supports the use of medium strength SSL ciphers.

Description
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths
at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.

Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.

See Also

https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://sweet32.info

Solution
Reconfigure the affected application if possible to avoid use of medium strength ciphers.

Risk Factor
Medium

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 2/210
12/13/24, 4:22 PM AD1

CVSS v3.0 Base Score


7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

VPR Score
5.1

EPSS Score
0.0053

CVSS v2.0 Base Score


5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

References

CVE CVE-2016-2183

Plugin Information
Published: 2009/11/23, Modified: 2021/02/03

Plugin Output
tcp/3389/msrdp

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 3/210
12/13/24, 4:22 PM AD1

51192 - SSL Certificate Cannot Be Trusted -

Synopsis
The SSL certificate for this service cannot be trusted.

Description
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :

- First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of
the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known
public certificate authority.

- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates.

- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a
signing algorithm that Nessus either does not support or does not recognize.

If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server.
This could make it easier to carry out man-in-the-middle attacks against the remote host.

See Also

https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509

Solution
Purchase or generate a proper SSL certificate for this service.

Risk Factor
Medium

CVSS v3.0 Base Score


file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 4/210
12/13/24, 4:22 PM AD1

6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVSS v2.0 Base Score


6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)

Plugin Information
Published: 2010/12/15, Modified: 2020/04/27

Plugin Output
tcp/3389/msrdp

The following certificate was at the top of the certificate


chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=AD01.tayninh.dcs.vn
|-Issuer : CN=AD01.tayninh.dcs.vn

51192 - SSL Certificate Cannot Be Trusted -

Synopsis
The SSL certificate for this service cannot be trusted.

Description
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :

- First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of
the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known
public certificate authority.

- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates.

- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 5/210
12/13/24, 4:22 PM AD1

getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a
signing algorithm that Nessus either does not support or does not recognize.

If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server.
This could make it easier to carry out man-in-the-middle attacks against the remote host.

See Also

https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509

Solution
Purchase or generate a proper SSL certificate for this service.

Risk Factor
Medium

CVSS v3.0 Base Score


6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVSS v2.0 Base Score


6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)

Plugin Information
Published: 2010/12/15, Modified: 2020/04/27

Plugin Output
tcp/8834/www

The following certificate was at the top of the certificate


chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : O=Nessus Users United/OU=Nessus Server/L=New York/C=US/ST=NY/CN=AD01


|-Issuer : O=Nessus Users United/OU=Nessus Certification Authority/L=New York/C=US/ST=NY/CN=Nessus Certification Authority

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 6/210
12/13/24, 4:22 PM AD1

57582 - SSL Self-Signed Certificate -

Synopsis
The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

Description
The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use
of SSL as anyone could establish a man-in-the-middle attack against the remote host.

Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.

Solution
Purchase or generate a proper SSL certificate for this service.

Risk Factor
Medium

CVSS v3.0 Base Score


6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVSS v2.0 Base Score


6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)

Plugin Information
Published: 2012/01/17, Modified: 2022/06/14

Plugin Output
tcp/3389/msrdp

The following certificate was found at the top of the certificate


chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 7/210
12/13/24, 4:22 PM AD1

|-Subject : CN=AD01.tayninh.dcs.vn

104743 - TLS Version 1.0 Protocol Detection -

Synopsis
The remote service encrypts traffic using an older version of TLS.

Description
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate
these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible.

As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.

PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect)
that can be verified as not being susceptible to any known exploits.

See Also

https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00

Solution
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

Risk Factor
Medium

CVSS v3.0 Base Score


6.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)

CVSS v2.0 Base Score


6.1 (CVSS2#AV:N/AC:H/Au:N/C:C/I:P/A:N)

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 8/210
12/13/24, 4:22 PM AD1

References

XREF CWE:327

Plugin Information
Published: 2017/11/22, Modified: 2023/04/19

Plugin Output
tcp/3389/msrdp

TLSv1 is enabled and the server supports at least one cipher.

157288 - TLS Version 1.1 Deprecated Protocol -

Synopsis
The remote service encrypts traffic using an older version of TLS.

Description
The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended cipher suites. Ciphers that support
encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1

As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.

See Also

https://datatracker.ietf.org/doc/html/rfc8996
http://www.nessus.org/u?c8ae820d

Solution
Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.

Risk Factor
Medium
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 9/210
12/13/24, 4:22 PM AD1

CVSS v3.0 Base Score


6.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)

CVSS v2.0 Base Score


6.1 (CVSS2#AV:N/AC:H/Au:N/C:C/I:P/A:N)

References

XREF CWE:327

Plugin Information
Published: 2022/04/04, Modified: 2024/05/14

Plugin Output
tcp/3389/msrdp

TLSv1.1 is enabled and the server supports at least one cipher.

58453 - Terminal Services Doesn't Use Network Level Authentication (NLA) Only -

Synopsis
The remote Terminal Services doesn't use Network Level Authentication only.

Description
The remote Terminal Services is not configured to use Network Level Authentication (NLA) only. NLA uses the Credential Security Support Provider (CredSSP)
protocol to perform strong server authentication either through TLS/SSL or Kerberos mechanisms, which protect against man-in-the-middle attacks. In addition to
improving authentication, NLA also helps protect the remote computer from malicious users and software by completing user authentication before a full RDP
connection is established.

See Also

https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732713(v=ws.11)
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 10/210
12/13/24, 4:22 PM AD1

http://www.nessus.org/u?e2628096

Solution
Enable Network Level Authentication (NLA) on the remote RDP server. This is generally done on the 'Remote' tab of the 'System' settings on Windows.

Risk Factor
Medium

CVSS v3.0 Base Score


4.0 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N)

CVSS v2.0 Base Score


4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

Plugin Information
Published: 2012/03/23, Modified: 2024/07/17

Plugin Output
tcp/3389/msrdp

Nessus was able to negotiate non-NLA (Network Level Authentication) security.

46180 - Additional DNS Hostnames -

Synopsis
Nessus has detected potential virtual hosts.

Description
Hostnames different from the current hostname have been collected by miscellaneous plugins. Nessus has generated a list of hostnames that point to the remote
host. Note that these are only the alternate hostnames for vhosts discovered on a web server.

Different web servers may be hosted on name-based virtual hosts.

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 11/210
12/13/24, 4:22 PM AD1

See Also

https://en.wikipedia.org/wiki/Virtual_hosting

Solution
If you want to test them, re-scan using the special vhost syntax, such as :

www.example.com[192.0.32.10]

Risk Factor
None

Plugin Information
Published: 2010/04/29, Modified: 2022/08/15

Plugin Output
tcp/0

The following hostnames point to the remote host :


- ad01

10761 - COM+ Internet Services (CIS) Server Detection -

Synopsis
A COM+ Internet Services (CIS) server is listening on this port.

Description
COM+ Internet Services are RPC over HTTP tunneling and require IIS to operate. CIS ports shouldn't be visible on internet but only behind a firewall.

See Also

http://www.nessus.org/u?d02f7e6e
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 12/210
12/13/24, 4:22 PM AD1

https://support.microsoft.com/en-us/support/kb/articles/q282/2/61.asp

Solution
If you do not use this service, disable it with DCOMCNFG.

Otherwise, limit access to this port.

Risk Factor
None

Plugin Information
Published: 2001/09/14, Modified: 2019/11/22

Plugin Output
tcp/55952/ncacn_http

Server banner :

ncacn_http/1.0

45590 - Common Platform Enumeration (CPE) -

Synopsis
It was possible to enumerate CPE names that matched on the remote system.

Description
By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products
found on a host.

Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.

See Also

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 13/210
12/13/24, 4:22 PM AD1

http://cpe.mitre.org/
https://nvd.nist.gov/products/cpe

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2010/04/21, Modified: 2024/11/22

Plugin Output
tcp/0

The remote operating system matched the following CPE :

cpe:/o:microsoft:windows -> Microsoft Windows

Following application CPE matched on the remote system :

cpe:/a:tenable:nessus -> Tenable Nessus

10736 - DCE Services Enumeration -

Synopsis
A DCE/RPC service is running on the remote host.

Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 14/210
12/13/24, 4:22 PM AD1

n/a

Risk Factor
None

Plugin Information
Published: 2001/08/26, Modified: 2021/10/04

Plugin Output
tcp/135/epmap

The following DCERPC services are available locally :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : NETLOGON_LRPC

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : NTDS_LPC

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : OLE2C81DF220C1489A9B1EFFEE3843C

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : MicrosoftLaps_LRPC_0fb2f016-fe45-4a08-a7f9-a467f5e5fa0b

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 15/210
12/13/24, 4:22 PM AD1
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : cc105610-da03-467e-bc73-5b9e2937458d, version 1.0
Description : Unknown RPC service
Annotation : LiveIdSvc RPC Interface
Type : Local RPC service
Named pipe : LRPC-ca8fefbab0b4cc38d2

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : faf2447b-b348-4feb-8dbe-beee5b7f7778, version 1.0
Description : Unknown RPC service
Annotation : OnlineProviderCert RPC Interface
Type : Local RPC service
Named pipe : LRPC-ca8fefbab0b4cc38d2

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 572e35b4-1344-4565-96a1-f5df3bfa89bb, version 1.0
Description : Unknown RPC service
Annotation : LiveIdSvcNotify RPC Interface
Type : Local RPC service
Named pipe : liveidsvcnotify

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 0497b57d-2e66-424f-a0c6-157cd5d41700, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : LRPC-d26fe3d0e050104e77

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : LRPC-d26fe3d0e050104e77

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : LRPC-d26fe3d0e050104e77

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 16/210
12/13/24, 4:22 PM AD1
Named pipe : LRPC-d26fe3d0e050104e77

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : LRPC-d26fe3d0e050104e77

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : a4b8d482-80ce-40d6-934d-b22a01a44fe7, version 1.0
Description : Unknown RPC service
Annotation : LicenseManager
Type : Local RPC service
Named pipe : LicenseServiceEndpoint

Object UUID : 00000002-0000-0000-0000-000000000000


UUID : 8ec21e98-b5ce-4916-a3d6-449fa428a007, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE17C95B91E3219D426D3BBDB7F238

Object UUID : 00000002-0000-0000-0000-000000000000


UUID : 8ec21e98-b5ce-4916-a3d6-449fa428a007, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-4e6556720202bff8b8

Object UUID : 00000002-0000-0000-0000-000000000000


UUID : 0fc77b1a-95d8-4a2e-a0c0-cff54237462b, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE17C95B91E3219D426D3BBDB7F238

Object UUID : 00000002-0000-0000-0000-000000000000


UUID : 0fc77b1a-95d8-4a2e-a0c0-cff54237462b, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-4e6556720202bff8b8

Object UUID : 00000002-0000-0000-0000-000000000000


UUID : b1ef227e-dfa5-421e-82bb-67a6a129c496, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE17C95B91E3219D426D3BBDB7F238

Object UUID : 00000002-0000-0000-0000-000000000000


UUID : b1ef227e-dfa5-421e-82bb-67a6a129c496, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-4e6556720202bff8b8

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 17/210
12/13/24, 4:22 PM AD1

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000002


UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc0175AEB32

Object UUID : 52ef130c-08fd-4388-86b3-6edf00000002


UUID : 12e65dd8-887f-41ef-91bf-8d816c42c2e7, version 1.0
Description : Unknown RPC service
Annotation : Secure Desktop LRPC interface
Type : Local RPC service
Named pipe : WMsgKRpc0175AEB32

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE0BCD9C9F36BEBD6B02CBB7E6D5D0

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-51de77f002caceacf4

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
Description : Unknown RPC service
Annotation : PcaSvc
Type : Local RPC service
Named pipe : LRPC-d0947aae2cf7c72aef

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : d8140e00-5c46-4ae6-80ac-2f9a76df224c, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-af4680928f58a69a65

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : d249bd56-4cc0-4fd3-8ce6-6fe050d590cb, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-af4680928f58a69a65

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : c503f532-443a-4c69-8300-ccd1fbdb3839, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE0E5979E9CAD80617433C880A3E08

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 18/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c503f532-443a-4c69-8300-ccd1fbdb3839, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-eda97a1aeac1eba588

Object UUID : bae10e73-0001-0000-9dab-7d0f635c171a


UUID : 509bc7ae-77be-4ee8-b07c-0d096bb44345, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEC6C4A0B511AFAEAB239870A4C495

Object UUID : bae10e73-0001-0000-9dab-7d0f635c171a


UUID : 509bc7ae-77be-4ee8-b07c-0d096bb44345, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3b649e68339cac57bf

Object UUID : 5bc1ed07-f5f5-485f-9dfd-6fd0acf9a23c


UUID : 897e2e5f-93f3-4376-9c9c-fd2277495c27, version 1.0
Description : Unknown RPC service
Annotation : Frs2 Service
Type : Local RPC service
Named pipe : OLE9E37F2ADA4D88606632A8FEE81B0

Object UUID : 3bdb59a0-d736-4d44-9074-c1ee00000001


UUID : f3f09ffd-fbcf-4291-944d-70ad6e0e73bb, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-927565ccc5407b3a8a

Object UUID : 8ac5c30f-f593-48fe-af48-57e5eafccffc


UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC-4b4929dfdd8984b573

Object UUID : a7c490c7-6d7f-4084-a2d4-18970fbec628


UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC-4b4929dfdd8984b573

Object UUID : ae74854d-fae6-4bb7-a48c-62308f3f82f5


UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC-4b4929dfdd8984b573

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 19/210
12/13/24, 4:22 PM AD1

Object UUID : a8611804-7ac7-4172-912e-991aa4e6d2c4


UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : OLE8A1D836A751DE7CB83D2E1305319

Object UUID : a8611804-7ac7-4172-912e-991aa4e6d2c4


UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC-f949dfaeb4379640b1

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 650a7e26-eab8-5533-ce43-9c1dfce11511, version 1.0
Description : Unknown RPC service
Annotation : Vpn APIs
Type : Local RPC service
Named pipe : RasmanLrpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 650a7e26-eab8-5533-ce43-9c1dfce11511, version 1.0
Description : Unknown RPC service
Annotation : Vpn APIs
Type : Local RPC service
Named pipe : VpnikeRpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 650a7e26-eab8-5533-ce43-9c1dfce11511, version 1.0
Description : Unknown RPC service
Annotation : Vpn APIs
Type : Local RPC service
Named pipe : LRPC-9e84b62169a036e22b

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 7df1ceae-de4e-4e6f-ab14-49636e7c2052, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-6393c2bd28f7be7c2d

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : d4051bde-9cdd-4910-b393-4aa85ec3c482, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE483C97FBCA280BB142856D6C8C57

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : d4051bde-9cdd-4910-b393-4aa85ec3c482, version 1.0
Description : Unknown RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 20/210
12/13/24, 4:22 PM AD1
Type : Local RPC service
Named pipe : LRPC-3258d8a9cfb6480cbc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 4c9dbf19-d39e-4bb9-90ee-8f7179b20283, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE483C97FBCA280BB142856D6C8C57

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 4c9dbf19-d39e-4bb9-90ee-8f7179b20283, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3258d8a9cfb6480cbc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : fd8be72b-a9cd-4b2c-a9ca-4ded242fbe4d, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE483C97FBCA280BB142856D6C8C57

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : fd8be72b-a9cd-4b2c-a9ca-4ded242fbe4d, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3258d8a9cfb6480cbc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 95095ec8-32ea-4eb0-a3e2-041f97b36168, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE483C97FBCA280BB142856D6C8C57

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 95095ec8-32ea-4eb0-a3e2-041f97b36168, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3258d8a9cfb6480cbc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e38f5360-8572-473e-b696-1b46873beeab, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE483C97FBCA280BB142856D6C8C57

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e38f5360-8572-473e-b696-1b46873beeab, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3258d8a9cfb6480cbc

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 21/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : d22895ef-aff4-42c5-a5b2-b14466d34ab4, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE483C97FBCA280BB142856D6C8C57

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : d22895ef-aff4-42c5-a5b2-b14466d34ab4, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3258d8a9cfb6480cbc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 98cd761e-e77d-41c8-a3c0-0fb756d90ec2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE483C97FBCA280BB142856D6C8C57

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 98cd761e-e77d-41c8-a3c0-0fb756d90ec2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3258d8a9cfb6480cbc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 1d45e083-478f-437c-9618-3594ced8c235, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE483C97FBCA280BB142856D6C8C57

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 1d45e083-478f-437c-9618-3594ced8c235, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3258d8a9cfb6480cbc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-1844e906b29fedc3d9

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LRPC-7e7f054d63f9deb8d5

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 22/210
12/13/24, 4:22 PM AD1
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-7e7f054d63f9deb8d5

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-7e7f054d63f9deb8d5

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-7e7f054d63f9deb8d5

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 76f03f96-cdfd-44fc-a22c-64950a001209, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-7e7f054d63f9deb8d5

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
Description : Unknown RPC service
Annotation : XactSrv service
Type : Local RPC service
Named pipe : LRPC-c8588eefc7d836d4a3

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 1a0d010f-1c33-432c-b0f5-8cf4e8053099, version 1.0
Description : Unknown RPC service
Annotation : IdSegSrv service
Type : Local RPC service
Named pipe : LRPC-c8588eefc7d836d4a3

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : OLE7A1A42FDB5539D8A29CFBD8914EE

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : LRPC-3366dac257d4c7b192

Object UUID : 00000000-0000-0000-0000-000000000000

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 23/210
12/13/24, 4:22 PM AD1
UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : OLE7A1A42FDB5539D8A29CFBD8914EE

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : LRPC-3366dac257d4c7b192

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-0bf57f9eef44270bf4

Object UUID : 73736573-6f69-656e-6e76-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : LRPC-ffcecee6941944a99c

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ffcecee6941944a99c

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : SessEnvPrivateRpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : LRPC-184de9a17e9cdd75b5

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager provider server endpoint
Type : Local RPC service
Named pipe : LRPC-184de9a17e9cdd75b5

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 24/210
12/13/24, 4:22 PM AD1

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager provider server endpoint
Type : Local RPC service
Named pipe : TeredoDiagnostics

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager provider server endpoint
Type : Local RPC service
Named pipe : TeredoControl

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager client server endpoint
Type : Local RPC service
Named pipe : LRPC-184de9a17e9cdd75b5

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager client server endpoint
Type : Local RPC service
Named pipe : TeredoDiagnostics

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager client server endpoint
Type : Local RPC service
Named pipe : TeredoControl

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Local RPC service
Named pipe : LRPC-184de9a17e9cdd75b5

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Local RPC service
Named pipe : TeredoDiagnostics

Object UUID : 00000000-0000-0000-0000-000000000000

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 25/210
12/13/24, 4:22 PM AD1
UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Local RPC service
Named pipe : TeredoControl

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f2c9b409-c1c9-4100-8639-d8ab1486694a, version 1.0
Description : Unknown RPC service
Annotation : Witness Client Upcall Server
Type : Local RPC service
Named pipe : LRPC-692b41f5d746010b4d

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : eb081a0d-10ee-478a-a1dd-50995283e7a8, version 3.0
Description : Unknown RPC service
Annotation : Witness Client Test Interface
Type : Local RPC service
Named pipe : LRPC-692b41f5d746010b4d

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
Description : Unknown RPC service
Annotation : DfsDs service
Type : Local RPC service
Named pipe : LRPC-692b41f5d746010b4d

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : abfb6ca3-0c5e-4734-9285-0aee72fe8d1c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLED706F4E85819021F0E1794644A0F

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : abfb6ca3-0c5e-4734-9285-0aee72fe8d1c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-17e2e2949d1de1edd2

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b37f900a-eae4-4304-a2ab-12bb668c0188, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLED706F4E85819021F0E1794644A0F

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b37f900a-eae4-4304-a2ab-12bb668c0188, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-17e2e2949d1de1edd2

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 26/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f44e62af-dab1-44c2-8013-049a9de417d6, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLED706F4E85819021F0E1794644A0F

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f44e62af-dab1-44c2-8013-049a9de417d6, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-17e2e2949d1de1edd2

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : c2d1b5dd-fa81-4460-9dd6-e7658b85454b, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLED706F4E85819021F0E1794644A0F

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : c2d1b5dd-fa81-4460-9dd6-e7658b85454b, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-17e2e2949d1de1edd2

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 13560fa9-8c09-4b56-a1fd-04d083b9b2a1, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLED706F4E85819021F0E1794644A0F

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 13560fa9-8c09-4b56-a1fd-04d083b9b2a1, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-17e2e2949d1de1edd2

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : dd490425-5325-4565-b774-7e27d6c09c24, version 1.0
Description : Unknown RPC service
Annotation : Base Firewall Engine API
Type : Local RPC service
Named pipe : LRPC-7aa02628bd91a6be02

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-7aa02628bd91a6be02

Object UUID : 00000000-0000-0000-0000-000000000000

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 27/210
12/13/24, 4:22 PM AD1
UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-d00e07a53cd0912f9c

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f47433c3-3e9d-4157-aad4-83aa1f5c2d4c, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-7aa02628bd91a6be02

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f47433c3-3e9d-4157-aad4-83aa1f5c2d4c, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-d00e07a53cd0912f9c

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f47433c3-3e9d-4157-aad4-83aa1f5c2d4c, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-09ba711df7a80b261e

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-7aa02628bd91a6be02

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-d00e07a53cd0912f9c

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-09ba711df7a80b261e

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0
Description : Unknown RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 28/210
12/13/24, 4:22 PM AD1
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-19fff3380660da2bab

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
Description : Unknown RPC service
Annotation : WinHttp Auto-Proxy Service
Type : Local RPC service
Named pipe : LRPC-f232228264cc6731dc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
Description : Unknown RPC service
Annotation : WinHttp Auto-Proxy Service
Type : Local RPC service
Named pipe : cc848e01-13e0-458f-aeea-5dd6808f873f

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 3f787932-3452-4363-8651-6ea97bb373bb, version 1.0
Description : Unknown RPC service
Annotation : NSP Rpc Interface
Type : Local RPC service
Named pipe : OLE42D809EE7479B2E32F8B1E934785

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 3f787932-3452-4363-8651-6ea97bb373bb, version 1.0
Description : Unknown RPC service
Annotation : NSP Rpc Interface
Type : Local RPC service
Named pipe : LRPC-db400e056ec8d8ab56

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : LRPC-0b8bf119858d0e914d

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : LRPC-0b8bf119858d0e914d

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 29/210
12/13/24, 4:22 PM AD1
Named pipe : LRPC-0b8bf119858d0e914d

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-0b8bf119858d0e914d

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : ubpmtaskhostchannel

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ade8c5b2cdeb7aafc5

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-0b8bf119858d0e914d

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : ubpmtaskhostchannel

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ade8c5b2cdeb7aafc5

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-0b8bf119858d0e914d

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : ubpmtaskhostchannel

Object UUID : 00000000-0000-0000-0000-000000000000

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 30/210
12/13/24, 4:22 PM AD1
UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ade8c5b2cdeb7aafc5

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000001


UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc0ACED1

Object UUID : 6c637067-6569-746e-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : LRPC-c32ef927837b08f889

Object UUID : 24d1f7c7-76af-4f28-9ccd-7f6cb6468601


UUID : 2eb08e3e-639f-4fba-97b1-14f878961076, version 1.0
Description : Unknown RPC service
Annotation : Group Policy RPC Interface
Type : Local RPC service
Named pipe : LRPC-a3f717e4ca5ab40341

Object UUID : 736e6573-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : senssvc

Object UUID : 736e6573-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : LRPC-7f1191e032ac7d39c2

Object UUID : 666f7270-6c69-7365-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
Description : Unknown RPC service
Annotation : Event log TCPIP
Type : Local RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 31/210
12/13/24, 4:22 PM AD1
Named pipe : eventlog

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : DNSResolver

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : LRPC-578c3f0367239fb316

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : dhcpcsvc6

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : dhcpcsvc6

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : dhcpcsvc

Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-6355a9cebe52136b0d

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-6355a9cebe52136b0d

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 32/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e06e3b0d4a5e724b0e

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0
Description : Unknown RPC service
Annotation : NSI server endpoint
Type : Local RPC service
Named pipe : LRPC-d23688f0c2944acccb

Object UUID : fdd099c6-df06-4904-83b4-a87a27903c70


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-03c4c1410ce81f5994

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 5222821f-d5e2-4885-84f1-5f6185a0ec41, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-023165854340de242e

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
Description : Unknown RPC service
Annotation : KAPI Service endpoint
Type : Local RPC service
Named pipe : LRPC-03c4c1410ce81f5994

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
Description : Unknown RPC service
Annotation : KAPI Service endpoint
Type : Local RPC service
Named pipe : OLED03D1012D795622EFFA19C6590E8

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
Description : Unknown RPC service
Annotation : KAPI Service endpoint
Type : Local RPC service
Named pipe : LRPC-4009140bd7e4f3d385

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-31cafcef0ae301a6c3

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 33/210
12/13/24, 4:22 PM AD1

Object UUID : 6d726574-7273-0076-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : LRPC-633850c5e4d08c5e46

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 4bec6bb8-b5c2-4b6f-b2c1-5da5cf92d0d9, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 085b0334-e454-4d91-9b8c-4134f9e793f3, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8782d3b9-ebbd-4644-a3d8-e8725381919b, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 3b338d89-6cfa-44b8-847e-531531bc9992, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : bdaa0970-413b-4a3e-9e5d-f6dc9d7e0760, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 5824833b-3c1a-4ad2-bdfd-c31d19e23ed2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 0361ae94-0316-4c6c-8ad8-c594375800e2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 34/210
12/13/24, 4:22 PM AD1
UUID : dd59071b-3215-4c59-8481-972edadc0f6a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : dd59071b-3215-4c59-8481-972edadc0f6a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : dd59071b-3215-4c59-8481-972edadc0f6a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
Description : Unknown RPC service
Type : Local RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 35/210
12/13/24, 4:22 PM AD1
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 36/210
12/13/24, 4:22 PM AD1
UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 2.0
Description : Unknown RPC service
Type : Local RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 37/210
12/13/24, 4:22 PM AD1
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 38/210
12/13/24, 4:22 PM AD1
UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-f8f1d91a758d5b978f

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
Description : Unknown RPC service
Type : Local RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 39/210
12/13/24, 4:22 PM AD1
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-f8f1d91a758d5b978f

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-f8f1d91a758d5b978f

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 40/210
12/13/24, 4:22 PM AD1
UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 178d84be-9291-4994-82c6-3f909aca5a03, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e53d94ca-7464-4839-b044-09a2fb8b3ae5, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : fae436b0-b864-4a87-9eda-298547cd82f2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 082a3471-31b6-422a-b931-a54401960c62, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 6982a06e-5fe2-46b1-b39c-a2c545bfa069, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 0ff1f646-13bb-400a-ab50-9a78f2b7a85a, version 1.0
Description : Unknown RPC service
Type : Local RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 41/210
12/13/24, 4:22 PM AD1
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 4ed8abcc-f1e2-438b-981f-bb0e8abc010c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 95406f0b-b239-4318-91bb-cea3a46ff0dc, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 0d47017b-b33b-46ad-9e18-fe96456c5078, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 7cd4a68a-505e-456b-b11e-ca76a5dd491c


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 7cd4a68a-505e-456b-b11e-ca76a5dd491c


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 7cd4a68a-505e-456b-b11e-ca76a5dd491c


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 7cd4a68a-505e-456b-b11e-ca76a5dd491c


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 7cd4a68a-505e-456b-b11e-ca76a5dd491c


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-f8f1d91a758d5b978f

Object UUID : 7cd4a68a-505e-456b-b11e-ca76a5dd491c

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 42/210
12/13/24, 4:22 PM AD1
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ff6ccc6a521a3c27a7

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-f8f1d91a758d5b978f

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ff6ccc6a521a3c27a7

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-62ae3cc8443f717296

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 43/210
12/13/24, 4:22 PM AD1
Named pipe : umpo

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-f8f1d91a758d5b978f

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ff6ccc6a521a3c27a7

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-62ae3cc8443f717296

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 44/210
12/13/24, 4:22 PM AD1
UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-f8f1d91a758d5b978f

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ff6ccc6a521a3c27a7

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-62ae3cc8443f717296

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-83ad4b32d1ce355679

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 45/210
12/13/24, 4:22 PM AD1
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-f8f1d91a758d5b978f

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ff6ccc6a521a3c27a7

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-62ae3cc8443f717296

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-83ad4b32d1ce355679

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86


UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : csebpub

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 46/210
12/13/24, 4:22 PM AD1
UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-f8f1d91a758d5b978f

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ff6ccc6a521a3c27a7

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-62ae3cc8443f717296

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-83ad4b32d1ce355679

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : csebpub

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : dabrpc

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000


UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 47/210
12/13/24, 4:22 PM AD1
Named pipe : WMsgKRpc0AB350

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000


UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WindowsShutdown

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91


UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc0AB350

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91


UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WindowsShutdown

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsacap

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 48/210
12/13/24, 4:22 PM AD1
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : MicrosoftLaps_LRPC_0fb2f016-fe45-4a08-a7f9-a467f5e5fa0b

Object UUID : 7364746e-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 49/210
12/13/24, 4:22 PM AD1
Named pipe : audit

Object UUID : 7364746e-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : securityevent

Object UUID : 7364746e-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 7364746e-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : lsacap

Object UUID : 7364746e-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 7364746e-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 7364746e-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 7364746e-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : protected_storage

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 50/210
12/13/24, 4:22 PM AD1
Object UUID : 7364746e-0000-0000-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 7364746e-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 7364746e-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : MicrosoftLaps_LRPC_0fb2f016-fe45-4a08-a7f9-a467f5e5fa0b

Object UUID : 7364746e-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : OLE2C81DF220C1489A9B1EFFEE3843C

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 51/210
12/13/24, 4:22 PM AD1

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Local RPC service
Named pipe : lsacap

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 52/210
12/13/24, 4:22 PM AD1
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Local RPC service
Named pipe : MicrosoftLaps_LRPC_0fb2f016-fe45-4a08-a7f9-a467f5e5fa0b

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Local RPC service
Named pipe : OLE2C81DF220C1489A9B1EFFEE3843C

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Local RPC service
Named pipe : NTDS_LPC

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 53/210
12/13/24, 4:22 PM AD1
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Local RPC service
Named pipe : lsacap

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Local RPC service
Named pipe : SidKey Local End Point

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 54/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Local RPC service
Named pipe : MicrosoftLaps_LRPC_0fb2f016-fe45-4a08-a7f9-a467f5e5fa0b

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Local RPC service
Named pipe : OLE2C81DF220C1489A9B1EFFEE3843C

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Local RPC service
Named pipe : NTDS_LPC

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Local RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 55/210
12/13/24, 4:22 PM AD1
Named pipe : LSARPC_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsacap

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Local RPC service
Named pipe : samss lpc

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 56/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Local RPC service
Named pipe : MicrosoftLaps_LRPC_0fb2f016-fe45-4a08-a7f9-a467f5e5fa0b

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Local RPC service
Named pipe : OLE2C81DF220C1489A9B1EFFEE3843C

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Local RPC service
Named pipe : NTDS_LPC

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : audit

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : securityevent

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : lsacap

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 57/210
12/13/24, 4:22 PM AD1
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : MicrosoftLaps_LRPC_0fb2f016-fe45-4a08-a7f9-a467f5e5fa0b

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 58/210
12/13/24, 4:22 PM AD1
Type : Local RPC service
Named pipe : OLE2C81DF220C1489A9B1EFFEE3843C

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : NTDS_LPC

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : NETLOGON_LRPC

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : audit

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : securityevent

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : lsacap

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 59/210
12/13/24, 4:22 PM AD1

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : MicrosoftLaps_LRPC_0fb2f016-fe45-4a08-a7f9-a467f5e5fa0b

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : OLE2C81DF220C1489A9B1EFFEE3843C

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 60/210
12/13/24, 4:22 PM AD1
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : NTDS_LPC

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : NETLOGON_LRPC

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsacap

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 61/210
12/13/24, 4:22 PM AD1
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Local RPC service
Named pipe : MicrosoftLaps_LRPC_0fb2f016-fe45-4a08-a7f9-a467f5e5fa0b

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Local RPC service
Named pipe : OLE2C81DF220C1489A9B1EFFEE3843C

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Local RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 62/210
12/13/24, 4:22 PM AD1
Named pipe : NTDS_LPC

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Local RPC service
Named pipe : NETLOGON_LRPC

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : lsacap

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : lsapolicylookup

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 63/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : MicrosoftLaps_LRPC_0fb2f016-fe45-4a08-a7f9-a467f5e5fa0b

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : OLE2C81DF220C1489A9B1EFFEE3843C

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : NTDS_LPC

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 64/210
12/13/24, 4:22 PM AD1
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : NETLOGON_LRPC

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : lsacap

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 65/210
12/13/24, 4:22 PM AD1
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : MicrosoftLaps_LRPC_0fb2f016-fe45-4a08-a7f9-a467f5e5fa0b

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : OLE2C81DF220C1489A9B1EFFEE3843C

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : NTDS_LPC

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : NETLOGON_LRPC

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 66/210
12/13/24, 4:22 PM AD1

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : lsacap

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 00000000-0000-0000-0000-000000000000

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 67/210
12/13/24, 4:22 PM AD1
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : SidKey Local End Point

10736 - DCE Services Enumeration -

Synopsis
A DCE/RPC service is running on the remote host.

Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2001/08/26, Modified: 2021/10/04

Plugin Output
tcp/445/cifs

The following DCERPC services are available remotely :

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 68/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
Named pipe : \pipe\863eb70c6985657f
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 338cd001-2244-31f1-aaaa-900038001003, version 1.0
Description : Remote Registry
Windows process : svchost.exe
Annotation : RemoteRegistry Interface
Type : Remote RPC service
Named pipe : \PIPE\winreg
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : da5a86c5-12c2-4943-ab30-7f74a813d853, version 1.0
Description : Unknown RPC service
Annotation : RemoteRegistry Perflib Interface
Type : Remote RPC service
Named pipe : \PIPE\winreg
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 650a7e26-eab8-5533-ce43-9c1dfce11511, version 1.0
Description : Unknown RPC service
Annotation : Vpn APIs
Type : Remote RPC service
Named pipe : \PIPE\ROUTER
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\SessEnvPublicRpc
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
Description : Unknown RPC service
Annotation : DfsDs service
Type : Remote RPC service
Named pipe : \PIPE\wkssvc
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 69/210
12/13/24, 4:22 PM AD1
Windows process : svchost.exe
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
Description : Unknown RPC service
Annotation : Event log TCPIP
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\AD01

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000


UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\InitShutdown
Netbios name : \\AD01

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91


UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 70/210
12/13/24, 4:22 PM AD1
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\InitShutdown
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\AD01

Object UUID : 7364746e-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Remote RPC service
Named pipe : \pipe\863eb70c6985657f
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 71/210
12/13/24, 4:22 PM AD1
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Remote RPC service
Named pipe : \pipe\863eb70c6985657f
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Remote RPC service
Named pipe : \pipe\863eb70c6985657f
Netbios name : \\AD01

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\AD01

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Remote RPC service
Named pipe : \pipe\863eb70c6985657f
Netbios name : \\AD01

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\AD01

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Remote RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 72/210
12/13/24, 4:22 PM AD1
Named pipe : \pipe\863eb70c6985657f
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Remote RPC service
Named pipe : \pipe\863eb70c6985657f
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Remote RPC service
Named pipe : \pipe\863eb70c6985657f
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\AD01

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
Named pipe : \pipe\863eb70c6985657f
Netbios name : \\AD01

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 73/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\AD01

10736 - DCE Services Enumeration -

Synopsis
A DCE/RPC service is running on the remote host.

Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2001/08/26, Modified: 2021/10/04

Plugin Output
tcp/49664/dce-rpc

The following DCERPC services are available on TCP port 49664 :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 74/210
12/13/24, 4:22 PM AD1
TCP Port : 49664
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
TCP Port : 49664
IP : 10.184.234.79

Object UUID : 7364746e-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Remote RPC service
TCP Port : 49664
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Remote RPC service
TCP Port : 49664
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Remote RPC service
TCP Port : 49664
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Remote RPC service
TCP Port : 49664
IP : 10.184.234.79

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Remote RPC service
TCP Port : 49664

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 75/210
12/13/24, 4:22 PM AD1
IP : 10.184.234.79

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Remote RPC service
TCP Port : 49664
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Remote RPC service
TCP Port : 49664
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Remote RPC service
TCP Port : 49664
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
TCP Port : 49664
IP : 10.184.234.79

10736 - DCE Services Enumeration -

Synopsis
A DCE/RPC service is running on the remote host.

Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 76/210
12/13/24, 4:22 PM AD1

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2001/08/26, Modified: 2021/10/04

Plugin Output
tcp/49665/dce-rpc

The following DCERPC services are available on TCP port 49665 :

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91


UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49665
IP : 10.184.234.79

10736 - DCE Services Enumeration -

Synopsis
A DCE/RPC service is running on the remote host.

Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution
n/a

Risk Factor
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 77/210
12/13/24, 4:22 PM AD1

None

Plugin Information
Published: 2001/08/26, Modified: 2021/10/04

Plugin Output
tcp/49666/dce-rpc

The following DCERPC services are available on TCP port 49666 :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
Description : Unknown RPC service
Annotation : Event log TCPIP
Type : Remote RPC service
TCP Port : 49666
IP : 10.184.234.79

10736 - DCE Services Enumeration -

Synopsis
A DCE/RPC service is running on the remote host.

Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution
n/a

Risk Factor
None

Plugin Information
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 78/210
12/13/24, 4:22 PM AD1

Published: 2001/08/26, Modified: 2021/10/04

Plugin Output
tcp/49667/dce-rpc

The following DCERPC services are available on TCP port 49667 :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49667
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49667
IP : 10.184.234.79

10736 - DCE Services Enumeration -

Synopsis
A DCE/RPC service is running on the remote host.

Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution
n/a

Risk Factor
None

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 79/210
12/13/24, 4:22 PM AD1

Plugin Information
Published: 2001/08/26, Modified: 2021/10/04

Plugin Output
tcp/49668/dce-rpc

The following DCERPC services are available on TCP port 49668 :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
TCP Port : 49668
IP : 10.184.234.79

Object UUID : 7364746e-0000-0000-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Remote RPC service
TCP Port : 49668
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4.0
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Remote RPC service
TCP Port : 49668
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Remote RPC service
TCP Port : 49668
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Remote RPC service
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 80/210
12/13/24, 4:22 PM AD1
TCP Port : 49668
IP : 10.184.234.79

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Remote RPC service
TCP Port : 49668
IP : 10.184.234.79

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da


UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Remote RPC service
TCP Port : 49668
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Remote RPC service
TCP Port : 49668
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Remote RPC service
TCP Port : 49668
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
TCP Port : 49668
IP : 10.184.234.79

10736 - DCE Services Enumeration -

Synopsis

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 81/210
12/13/24, 4:22 PM AD1

A DCE/RPC service is running on the remote host.

Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2001/08/26, Modified: 2021/10/04

Plugin Output
tcp/49671/dce-rpc

The following DCERPC services are available on TCP port 49671 :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49671
IP : 10.184.234.79

10736 - DCE Services Enumeration -

Synopsis
A DCE/RPC service is running on the remote host.

Description

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 82/210
12/13/24, 4:22 PM AD1

By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2001/08/26, Modified: 2021/10/04

Plugin Output
tcp/55953/dce-rpc

The following DCERPC services are available on TCP port 55953 :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Type : Remote RPC service
TCP Port : 55953
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 55953
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 55953
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0
Description : Unknown RPC service

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 83/210
12/13/24, 4:22 PM AD1
Type : Remote RPC service
TCP Port : 55953
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 76f03f96-cdfd-44fc-a22c-64950a001209, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 55953
IP : 10.184.234.79

10736 - DCE Services Enumeration -

Synopsis
A DCE/RPC service is running on the remote host.

Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2001/08/26, Modified: 2021/10/04

Plugin Output
tcp/55960/dce-rpc

The following DCERPC services are available on TCP port 55960 :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 367abb81-9844-35f1-ad32-98f038001003, version 2.0
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 84/210
12/13/24, 4:22 PM AD1
Description : Service Control Manager
Windows process : svchost.exe
Type : Remote RPC service
TCP Port : 55960
IP : 10.184.234.79

10736 - DCE Services Enumeration -

Synopsis
A DCE/RPC service is running on the remote host.

Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2001/08/26, Modified: 2021/10/04

Plugin Output
tcp/55963/dce-rpc

The following DCERPC services are available on TCP port 55963 :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
TCP Port : 55963
IP : 10.184.234.79
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 85/210
12/13/24, 4:22 PM AD1

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-01234567cffb, version 1.0
Description : Network Logon Service
Windows process : lsass.exe
Type : Remote RPC service
TCP Port : 55963
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Remote RPC service
TCP Port : 55963
IP : 10.184.234.79

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
TCP Port : 55963
IP : 10.184.234.79

10736 - DCE Services Enumeration -

Synopsis
A DCE/RPC service is running on the remote host.

Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution
n/a

Risk Factor
None

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 86/210
12/13/24, 4:22 PM AD1

Plugin Information
Published: 2001/08/26, Modified: 2021/10/04

Plugin Output
tcp/57999/dce-rpc

The following DCERPC services are available on TCP port 57999 :

Object UUID : 5bc1ed07-f5f5-485f-9dfd-6fd0acf9a23c


UUID : 897e2e5f-93f3-4376-9c9c-fd2277495c27, version 1.0
Description : Unknown RPC service
Annotation : Frs2 Service
Type : Remote RPC service
TCP Port : 57999
IP : 10.184.234.79

10736 - DCE Services Enumeration -

Synopsis
A DCE/RPC service is running on the remote host.

Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2001/08/26, Modified: 2021/10/04

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 87/210
12/13/24, 4:22 PM AD1

Plugin Output
tcp/58394/dce-rpc

The following DCERPC services are available on TCP port 58394 :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 50abc2a4-574d-40b3-9d66-ee4fd5fba076, version 5.0
Description : DNS Server
Windows process : dns.exe
Type : Remote RPC service
TCP Port : 58394
IP : 10.184.234.79

11002 - DNS Server Detection -

Synopsis
A DNS server is listening on the remote host.

Description
The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames and IP addresses.

See Also

https://en.wikipedia.org/wiki/Domain_Name_System

Solution
Disable this service if it is not needed or restrict access to internal hosts only if the service is available externally.

Risk Factor
None

Plugin Information
Published: 2003/02/13, Modified: 2017/05/16

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 88/210
12/13/24, 4:22 PM AD1

Plugin Output
tcp/53/dns

54615 - Device Type -

Synopsis
It is possible to guess the remote device type.

Description
Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2011/05/23, Modified: 2022/09/09

Plugin Output
tcp/0

Remote device type : general-purpose


Confidence level : 70

10107 - HTTP Server Type and Version -

Synopsis
A web server is running on the remote host.

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 89/210
12/13/24, 4:22 PM AD1

Description
This plugin attempts to determine the type and the version of the remote web server.

Solution
n/a

Risk Factor
None

References

XREF IAVT:0001-T-0931

Plugin Information
Published: 2000/01/04, Modified: 2020/10/30

Plugin Output
tcp/5985/www

The remote web server type is :

Microsoft-HTTPAPI/2.0

10107 - HTTP Server Type and Version -

Synopsis
A web server is running on the remote host.

Description
This plugin attempts to determine the type and the version of the remote web server.

Solution

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 90/210
12/13/24, 4:22 PM AD1

n/a

Risk Factor
None

References

XREF IAVT:0001-T-0931

Plugin Information
Published: 2000/01/04, Modified: 2020/10/30

Plugin Output
tcp/8834/www

The remote web server type is :

NessusWWW

10107 - HTTP Server Type and Version -

Synopsis
A web server is running on the remote host.

Description
This plugin attempts to determine the type and the version of the remote web server.

Solution
n/a

Risk Factor
None

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 91/210
12/13/24, 4:22 PM AD1

References

XREF IAVT:0001-T-0931

Plugin Information
Published: 2000/01/04, Modified: 2020/10/30

Plugin Output
tcp/47001/www

The remote web server type is :

Microsoft-HTTPAPI/2.0

12053 - Host Fully Qualified Domain Name (FQDN) Resolution -

Synopsis
It was possible to resolve the name of the remote host.

Description
Nessus was able to resolve the fully qualified domain name (FQDN) of the remote host.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2004/02/11, Modified: 2017/04/14

Plugin Output

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 92/210
12/13/24, 4:22 PM AD1

tcp/0

10.184.234.79 resolves as AD01.tayninh.dcs.vn.

24260 - HyperText Transfer Protocol (HTTP) Information -

Synopsis
Some information about the remote HTTP configuration can be extracted.

Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc...

This test is informational only and does not denote any security problem.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2007/01/30, Modified: 2024/02/26

Plugin Output
tcp/5985/www

Response Code : HTTP/1.1 404 Not Found

Protocol version : HTTP/1.1


HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : no

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 93/210
12/13/24, 4:22 PM AD1
Options allowed : (Not implemented)
Headers :

Content-Type: text/html; charset=us-ascii


Server: Microsoft-HTTPAPI/2.0
Date: Fri, 13 Dec 2024 09:08:15 GMT
Connection: close
Content-Length: 315

Response Body :

24260 - HyperText Transfer Protocol (HTTP) Information -

Synopsis
Some information about the remote HTTP configuration can be extracted.

Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc...

This test is informational only and does not denote any security problem.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2007/01/30, Modified: 2024/02/26

Plugin Output
tcp/8834/www

Response Code : HTTP/1.1 200 OK

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 94/210
12/13/24, 4:22 PM AD1
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Cache-Control: must-revalidate
X-Frame-Options: DENY
Content-Type: text/html
ETag: 0c0936fbdb6c7c11698d8e9ea6644365
Connection: close
X-XSS-Protection: 1; mode=block
Server: NessusWWW
Date: Fri, 13 Dec 2024 09:08:15 GMT
X-Content-Type-Options: nosniff
Content-Length: 1629
Content-Security-Policy: upgrade-insecure-requests; block-all-mixed-content; form-action 'self'; frame-ancestors 'none'; frame-src
https://store.tenable.com www.youtube.com; default-src 'self'; connect-src 'self' data.nessus-telemetry.tenable.com content.nessus-
telemetry.tenable.com api.tenable.com www.tenable.com; script-src 'self' content.nessus-telemetry.tenable.com www.tenable.com; img-
src 'self' data: content.nessus-telemetry.tenable.com data.nessus-telemetry.tenable.com pendo-static-
5689996938182656.storage.googleapis.com s.ytimg.com i.ytimg.com; style-src 'self' content.nessus-telemetry.tenable.com data.nessus-
telemetry.tenable.com pendo-static-5689996938182656.storage.googleapis.com www.tenable.com; object-src 'none'; base-uri 'self';
Strict-Transport-Security: max-age=31536000
Expect-CT: max-age=0

Response Body :

<!doctype html>
<html lang="en">
<head>
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1" />
<meta http-equiv="Content-Security-Policy" content="upgrade-insecure-requests; block-all-mixed-content; form-action 'self'; frame-
src https://store.tenable.com www.youtube.com; default-src 'self'; connect-src 'self' data.nessus-telemetry.tenable.com
content.nessus-telemetry.tenable.com api.tenable.com www.tenable.com; script-src 'self' content.nessus-telemetry.tenable.com
www.tenable.com; img-src 'self' data: data.nessus-telemetry.tenable.com content.nessus-telemetry.tenable.com pendo-static-
5689996938182656.storage.googleapis.com s.ytimg.com i.ytimg.com; style-src 'self' content.nessus-telemetry.tenable.com data.nessus-
telemetry.tenable.com pendo-static-5689996938182656.storage.googleapis.com www.tenable.com; object-src 'none'; base-uri 'self';" />
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta charset="utf-8" />
<title>Nessus</title>
<link rel="stylesheet" href="nessus6.css?v=1725650918429" id="theme-link" />
<link rel="stylesheet" href="tenable_links.css?v=ac05d80f1e3731b79d12103cdf9367fc" />
<link rel="stylesheet" href="wizard_templates.css?v=360be0ebe8ace4498713ac623087a7b0" />
<!--[if lt IE 11]>
<script>
window.location = '/unsupported6.html';
</script>
<![endif]-->
<script src="nessus6.js?v=1725650918429"></script>

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 95/210
12/13/24, 4:22 PM AD1
<script src="pendo-client.js"></script>
<!--Resource-Script-->
</head>
<body>
</body>
</html>

24260 - HyperText Transfer Protocol (HTTP) Information -

Synopsis
Some information about the remote HTTP configuration can be extracted.

Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc...

This test is informational only and does not denote any security problem.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2007/01/30, Modified: 2024/02/26

Plugin Output
tcp/47001/www

Response Code : HTTP/1.1 404 Not Found

Protocol version : HTTP/1.1


HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 96/210
12/13/24, 4:22 PM AD1
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Content-Type: text/html; charset=us-ascii


Server: Microsoft-HTTPAPI/2.0
Date: Fri, 13 Dec 2024 09:08:15 GMT
Connection: close
Content-Length: 315

Response Body :

43829 - Kerberos Information Disclosure -

Synopsis
The remote Kerberos server is leaking information.

Description
Nessus was able to retrieve the realm name and/or server time of the remote Kerberos server.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2010/01/08, Modified: 2015/09/24

Plugin Output
tcp/88

Nessus gathered the following information :

Server time : 2024-12-13 09:06:39 UTC


Realm : TAYNINH.DCS.VN
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 97/210
12/13/24, 4:22 PM AD1

25701 - LDAP Crafted Search Request Server Information Disclosure -

Synopsis
It is possible to discover information about the remote LDAP server.

Description
By sending a search request with a filter set to 'objectClass=*', it is possible to extract information about the remote LDAP server.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2007/07/12, Modified: 2022/09/28

Plugin Output
tcp/389/ldap

[+]-namingContexts:
| DC=tayninh,DC=dcs,DC=vn
| CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| DC=ForestDnsZones,DC=tayninh,DC=dcs,DC=vn
| DC=DomainDnsZones,DC=tayninh,DC=dcs,DC=vn
[+]-domainFunctionality:
| 7
[+]-forestFunctionality:
| 7
[+]-domainControllerFunctionality:
| 7
[+]-rootDomainNamingContext:
| DC=tayninh,DC=dcs,DC=vn
[+]-ldapServiceName:
| tayninh.dcs.vn:ad01$@TAYNINH.DCS.VN
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 98/210
12/13/24, 4:22 PM AD1
[+]-isGlobalCatalogReady:
| TRUE
[+]-supportedSASLMechanisms:
| GSSAPI
| GSS-SPNEGO
| EXTERNAL
| DIGEST-MD5
[+]-supportedLDAPVersion:
| 3
| 2
[+]-supportedLDAPPolicies:
| MaxPoolThreads
| MaxPercentDirSyncRequests
| MaxDatagramRecv
| MaxReceiveBuffer
| InitRecvTimeout
| MaxConnections
| MaxConnIdleTime
| MaxPageSize
| MaxBatchReturnMessages
| MaxQueryDuration
| MaxDirSyncDuration
| MaxTempTableSize
| MaxResultSetSize
| MinResultSets
| MaxResultSetsPerConn
| MaxNotificationPerConn
| MaxValRange
| MaxValRangeTransitive
| ThreadMemoryLimit
| SystemMemoryLimitPercent
[+]-supportedControl:
| 1.2.840.113556.1.4.319
| 1.2.840.113556.1.4.801
| 1.2.840.113556.1.4.473
| 1.2.840.113556.1.4.528
| 1.2.840.113556.1.4.417
| 1.2.840.113556.1.4.619
| 1.2.840.113556.1.4.841
| 1.2.840.113556.1.4.529
| 1.2.840.113556.1.4.805
| 1.2.840.113556.1.4.521
| 1.2.840.113556.1.4.970
| 1.2.840.113556.1.4.1338
| 1.2.840.113556.1.4.474
| 1.2.840.113556.1.4.1339
| 1.2.840.113556.1.4.1340
| 1.2.840.113556.1.4.1413
| 2.16.840.1.113730.3.4.9
| 2.16.840.1.113730.3.4.10
| 1.2.840.113556.1.4.1504

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 99/210
12/13/24, 4:22 PM AD1
| 1.2.840.113556.1.4.1852
| 1.2.840.113556.1.4.802
| 1.2.840.113556.1.4.1907
| 1.2.840.113556.1.4.1948
| 1.2.840.113556.1.4.1974
| 1.2.840.113556.1.4.1341
| 1.2.840.113556.1.4.2026
| 1.2.840.113556.1.4.2064
| 1.2.840.113556.1.4.2065
| 1.2.840.113556.1.4.2066
| 1.2.840.113556.1.4.2090
| 1.2.840.113556.1.4.2205
| 1.2.840.113556.1.4.2204
| 1.2.840.113556.1.4.2206
| 1.2.840.113556.1.4.2211
| 1.2.840.113556.1.4.2239
| 1.2.840.113556.1.4.2255
| 1.2.840.113556.1.4.2256
| 1.2.840.113556.1.4.2309
| 1.2.840.113556.1.4.2330
| 1.2.840.113556.1.4.2354
[+]-supportedCapabilities:
| 1.2.840.113556.1.4.800
| 1.2.840.113556.1.4.1670
| 1.2.840.113556.1.4.1791
| 1.2.840.113556.1.4.1935
| 1.2.840.113556.1.4.2080
| 1.2.840.113556.1.4.2237
[+]-subschemaSubentry:
| CN=Aggregate,CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-serverName:
| CN=AD01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-schemaNamingContext:
| CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-namingContexts:
| DC=tayninh,DC=dcs,DC=vn
| CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| DC=ForestDnsZones,DC=tayninh,DC=dcs,DC=vn
| DC=DomainDnsZones,DC=tayninh,DC=dcs,DC=vn
[+]-isSynchronized:
| TRUE
[+]-highestCommittedUSN:
| 163164
[+]-dsServiceName:
| CN=NTDS Settings,CN=AD01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-dnsHostName:
| AD01.tayninh.dcs.vn
[+]-defaultNamingContext:
| DC=tayninh,DC=dcs,DC=vn
[+]-currentTime:

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 100/210
12/13/24, 4:22 PM AD1
| 20241213090703.0Z
[+]-configurationNamingContext:
| CN=Configuration,DC=tayninh,DC=dcs,DC=vn

25701 - LDAP Crafted Search Request Server Information Disclosure -

Synopsis
It is possible to discover information about the remote LDAP server.

Description
By sending a search request with a filter set to 'objectClass=*', it is possible to extract information about the remote LDAP server.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2007/07/12, Modified: 2022/09/28

Plugin Output
tcp/3268/ldap

[+]-namingContexts:
| DC=tayninh,DC=dcs,DC=vn
| CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| DC=ForestDnsZones,DC=tayninh,DC=dcs,DC=vn
| DC=DomainDnsZones,DC=tayninh,DC=dcs,DC=vn
[+]-domainFunctionality:
| 7
[+]-forestFunctionality:
| 7
[+]-domainControllerFunctionality:
| 7
[+]-rootDomainNamingContext:
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 101/210
12/13/24, 4:22 PM AD1
| DC=tayninh,DC=dcs,DC=vn
[+]-ldapServiceName:
| tayninh.dcs.vn:ad01$@TAYNINH.DCS.VN
[+]-isGlobalCatalogReady:
| TRUE
[+]-supportedSASLMechanisms:
| GSSAPI
| GSS-SPNEGO
| EXTERNAL
| DIGEST-MD5
[+]-supportedLDAPVersion:
| 3
| 2
[+]-supportedLDAPPolicies:
| MaxPoolThreads
| MaxPercentDirSyncRequests
| MaxDatagramRecv
| MaxReceiveBuffer
| InitRecvTimeout
| MaxConnections
| MaxConnIdleTime
| MaxPageSize
| MaxBatchReturnMessages
| MaxQueryDuration
| MaxDirSyncDuration
| MaxTempTableSize
| MaxResultSetSize
| MinResultSets
| MaxResultSetsPerConn
| MaxNotificationPerConn
| MaxValRange
| MaxValRangeTransitive
| ThreadMemoryLimit
| SystemMemoryLimitPercent
[+]-supportedControl:
| 1.2.840.113556.1.4.319
| 1.2.840.113556.1.4.801
| 1.2.840.113556.1.4.473
| 1.2.840.113556.1.4.528
| 1.2.840.113556.1.4.417
| 1.2.840.113556.1.4.619
| 1.2.840.113556.1.4.841
| 1.2.840.113556.1.4.529
| 1.2.840.113556.1.4.805
| 1.2.840.113556.1.4.521
| 1.2.840.113556.1.4.970
| 1.2.840.113556.1.4.1338
| 1.2.840.113556.1.4.474
| 1.2.840.113556.1.4.1339
| 1.2.840.113556.1.4.1340
| 1.2.840.113556.1.4.1413

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 102/210
12/13/24, 4:22 PM AD1
| 2.16.840.1.113730.3.4.9
| 2.16.840.1.113730.3.4.10
| 1.2.840.113556.1.4.1504
| 1.2.840.113556.1.4.1852
| 1.2.840.113556.1.4.802
| 1.2.840.113556.1.4.1907
| 1.2.840.113556.1.4.1948
| 1.2.840.113556.1.4.1974
| 1.2.840.113556.1.4.1341
| 1.2.840.113556.1.4.2026
| 1.2.840.113556.1.4.2064
| 1.2.840.113556.1.4.2065
| 1.2.840.113556.1.4.2066
| 1.2.840.113556.1.4.2090
| 1.2.840.113556.1.4.2205
| 1.2.840.113556.1.4.2204
| 1.2.840.113556.1.4.2206
| 1.2.840.113556.1.4.2211
| 1.2.840.113556.1.4.2239
| 1.2.840.113556.1.4.2255
| 1.2.840.113556.1.4.2256
| 1.2.840.113556.1.4.2309
| 1.2.840.113556.1.4.2330
| 1.2.840.113556.1.4.2354
[+]-supportedCapabilities:
| 1.2.840.113556.1.4.800
| 1.2.840.113556.1.4.1670
| 1.2.840.113556.1.4.1791
| 1.2.840.113556.1.4.1935
| 1.2.840.113556.1.4.2080
| 1.2.840.113556.1.4.2237
[+]-subschemaSubentry:
| CN=Aggregate,CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-serverName:
| CN=AD01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-schemaNamingContext:
| CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-namingContexts:
| DC=tayninh,DC=dcs,DC=vn
| CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| DC=ForestDnsZones,DC=tayninh,DC=dcs,DC=vn
| DC=DomainDnsZones,DC=tayninh,DC=dcs,DC=vn
[+]-isSynchronized:
| TRUE
[+]-highestCommittedUSN:
| 163164
[+]-dsServiceName:
| CN=NTDS Settings,CN=AD01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-dnsHostName:
| AD01.tayninh.dcs.vn

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 103/210
12/13/24, 4:22 PM AD1
[+]-defaultNamingContext:
| DC=tayninh,DC=dcs,DC=vn
[+]-currentTime:
| 20241213090703.0Z
[+]-configurationNamingContext:
| CN=Configuration,DC=tayninh,DC=dcs,DC=vn

20870 - LDAP Server Detection -

Synopsis
An LDAP server was detected on the remote host.

Description
The remote host is running a Lightweight Directory Access Protocol (LDAP) server. LDAP is a protocol for providing access to directory services over TCP/IP.

See Also

https://en.wikipedia.org/wiki/LDAP

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2006/02/10, Modified: 2022/09/29

Plugin Output
tcp/389/ldap

20870 - LDAP Server Detection -

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 104/210
12/13/24, 4:22 PM AD1

Synopsis
An LDAP server was detected on the remote host.

Description
The remote host is running a Lightweight Directory Access Protocol (LDAP) server. LDAP is a protocol for providing access to directory services over TCP/IP.

See Also

https://en.wikipedia.org/wiki/LDAP

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2006/02/10, Modified: 2022/09/29

Plugin Output
tcp/3268/ldap

42410 - Microsoft Windows NTLMSSP Authentication Request Remote Network Name Disclosure -

Synopsis
It is possible to obtain the network name of the remote host.

Description
The remote host listens on tcp port 445 and replies to SMB requests.

By sending an NTLMSSP authentication request it is possible to obtain the name of the remote system and the name of its domain.

Solution
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 105/210
12/13/24, 4:22 PM AD1

n/a

Risk Factor
None

Plugin Information
Published: 2009/11/06, Modified: 2019/11/22

Plugin Output
tcp/445/cifs

The following 2 NetBIOS names have been gathered :

AD01 = Computer name


TAYNINH = Workgroup / Domain name

10785 - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure -

Synopsis
It was possible to obtain information about the remote operating system.

Description
Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by sending an authentication request to port 139 or 445. Note
that this plugin requires SMB to be enabled on the host.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2001/10/17, Modified: 2021/09/20
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 106/210
12/13/24, 4:22 PM AD1

Plugin Output
tcp/445/cifs

Nessus was able to obtain the following information about the host, by
parsing the SMB2 Protocol's NTLM SSP message:

Target Name: TAYNINH


NetBIOS Domain Name: TAYNINH
NetBIOS Computer Name: AD01
DNS Domain Name: tayninh.dcs.vn
DNS Computer Name: AD01.tayninh.dcs.vn
DNS Tree Name: tayninh.dcs.vn
Product Version: 10.0.20348

26917 - Microsoft Windows SMB Registry : Nessus Cannot Access the Windows Registry -

Synopsis
Nessus is not able to access the remote Windows Registry.

Description
It was not possible to connect to PIPE\winreg on the remote host.

If you intend to use Nessus to perform registry-based checks, the registry checks will not work because the 'Remote Registry Access'
service (winreg) has been disabled on the remote host or can not be connected to with the supplied credentials.

Solution
n/a

Risk Factor
None

References

XREF IAVB:0001-B-0506

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 107/210
12/13/24, 4:22 PM AD1

Plugin Information
Published: 2007/10/04, Modified: 2020/09/22

Plugin Output
tcp/445/cifs

Could not connect to the registry because:


Could not connect to \winreg

11011 - Microsoft Windows SMB Service Detection -

Synopsis
A file / print sharing service is listening on the remote host.

Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers,
etc between nodes on a network.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2002/06/05, Modified: 2021/02/11

Plugin Output
tcp/139/smb

An SMB server is running on this port.

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 108/210
12/13/24, 4:22 PM AD1

11011 - Microsoft Windows SMB Service Detection -

Synopsis
A file / print sharing service is listening on the remote host.

Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers,
etc between nodes on a network.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2002/06/05, Modified: 2021/02/11

Plugin Output
tcp/445/cifs

A CIFS server is running on this port.

100871 - Microsoft Windows SMB Versions Supported (remote check) -

Synopsis
It was possible to obtain information about the version of SMB running on the remote host.

Description

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 109/210
12/13/24, 4:22 PM AD1

Nessus was able to obtain the version of SMB running on the remote host by sending an authentication request to port 139 or 445.

Note that this plugin is a remote check and does not work on agents.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2017/06/19, Modified: 2019/11/22

Plugin Output
tcp/445/cifs

The remote host supports the following versions of SMB :


SMBv2

106716 - Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check) -

Synopsis
It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.

Description
Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.

Solution
n/a

Risk Factor
None
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 110/210
12/13/24, 4:22 PM AD1

Plugin Information
Published: 2018/02/09, Modified: 2020/03/11

Plugin Output
tcp/445/cifs

The remote host supports the following SMB dialects :


_version_ _introduced in windows version_
2.0.2 Windows 2008
2.1 Windows 7
3.0 Windows 8
3.0.2 Windows 8.1
3.1.1 Windows 10

The remote host does NOT support the following SMB dialects :
_version_ _introduced in windows version_
2.2.2 Windows 8 Beta
2.2.4 Windows 8 Beta
3.1 Windows 10

19506 - Nessus Scan Information -

Synopsis
This plugin displays information about the Nessus scan.

Description
This plugin displays, for each tested host, information about the scan itself :

- The version of the plugin set.


- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.
- The port range scanned.
- The ping round trip time
- Whether credentialed or third-party patch management checks are possible.

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 111/210
12/13/24, 4:22 PM AD1

- Whether the display of superseded patches is enabled


- The date of the scan.
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2005/08/26, Modified: 2024/10/04

Plugin Output
tcp/0

Information about this scan :

Nessus version : 10.8.3


Nessus build : 20010
Plugin feed version : 202412121915
Scanner edition used : Nessus
Scanner OS : WINDOWS
Scanner distribution : win-x86-64
Scan type : Normal
Scan name : AD1
Scan policy used : Basic Network Scan
Scanner IP : 10.184.234.79
Ping RTT : Unavailable
Thorough tests : no
Experimental tests : no
Scan for Unpatched Vulnerabilities : no
Plugin debugging enabled : no
Paranoia level : 1
Report verbosity : 2
Safe checks : yes
Optimize the test : no
Credentialed checks : no
Patch management checks : None
Display superseded patches : yes (supersedence plugin did not launch)

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 112/210
12/13/24, 4:22 PM AD1
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : None
Allow post-scan editing : Yes
Nessus Plugin Signature Checking : Enabled
Audit File Signature Checking : Disabled
Scan Start Date : 2024/12/13 16:05 SE Asia Standard Time
Scan duration : 504 sec
Scan for malware : no

10147 - Nessus Server Detection -

Synopsis
A Nessus daemon is listening on the remote port.

Description
A Nessus daemon is listening on the remote port.

See Also

https://www.tenable.com/products/nessus/nessus-professional

Solution
Ensure that the remote Nessus installation has been authorized.

Risk Factor
None

References

XREF IAVT:0001-T-0673

Plugin Information

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 113/210
12/13/24, 4:22 PM AD1

Published: 1999/10/12, Modified: 2023/02/08

Plugin Output
tcp/8834/www

URL : https://AD01.tayninh.dcs.vn:8834/
Version : unknown

24786 - Nessus Windows Scan Not Performed with Admin Privileges -

Synopsis
The Nessus scan of this host may be incomplete due to insufficient privileges provided.

Description
The Nessus scanner testing the remote host has been given SMB credentials to log into the remote host, however these credentials do not have administrative
privileges.

Typically, when Nessus performs a patch audit, it logs into the remote host and reads the version of the DLLs on the remote host to determine if a given patch has
been applied or not. This is the method Microsoft recommends to determine if a patch has been applied.

If your Nessus scanner does not have administrative privileges when doing a scan, then Nessus has to fall back to perform a patch audit through the registry which
may lead to false positives (especially when using third-party patch auditing tools) or to false negatives (not all patches can be detected through the registry).

Solution
Reconfigure your scanner to use credentials with administrative privileges.

Risk Factor
None

References

XREF IAVB:0001-B-0505

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 114/210
12/13/24, 4:22 PM AD1

Plugin Information
Published: 2007/03/12, Modified: 2020/09/22

Plugin Output
tcp/0

It was not possible to connect to '\\AD01\ADMIN$' with the supplied credentials.

58651 - Netstat Active Connections -

Synopsis
Active connections are enumerated via the 'netstat' command.

Description
This plugin runs 'netstat' on the remote machine to enumerate all active 'ESTABLISHED' or 'LISTENING' tcp/udp connections.

Note: The output for this plugin can be very long, and is not shown by default. To display it, enable verbose reporting in scan settings.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2012/04/10, Modified: 2021/06/29

Plugin Output
tcp/0

Netstat output :
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 115/210
12/13/24, 4:22 PM AD1

Active Connections

Proto Local Address Foreign Address State


TCP 0.0.0.0:88 0.0.0.0:0 LISTENING
TCP 0.0.0.0:135 0.0.0.0:0 LISTENING
TCP 0.0.0.0:389 0.0.0.0:0 LISTENING
TCP 0.0.0.0:445 0.0.0.0:0 LISTENING
TCP 0.0.0.0:464 0.0.0.0:0 LISTENING
TCP 0.0.0.0:593 0.0.0.0:0 LISTENING
TCP 0.0.0.0:636 0.0.0.0:0 LISTENING
TCP 0.0.0.0:3268 0.0.0.0:0 LISTENING
TCP 0.0.0.0:3269 0.0.0.0:0 LISTENING
TCP 0.0.0.0:3389 0.0.0.0:0 LISTENING
TCP 0.0.0.0:5985 0.0.0.0:0 LISTENING
TCP 0.0.0.0:8834 0.0.0.0:0 LISTENING
TCP 0.0.0.0:9389 0.0.0.0:0 LISTENING
TCP 0.0.0.0:47001 0.0.0.0:0 LISTENING
TCP 0.0.0.0:49664 0.0.0.0:0 LISTENING
TCP 0.0.0.0:49665 0.0.0.0:0 LISTENING
TCP 0.0.0.0:49666 0.0.0.0:0 LISTENING
TCP 0.0.0.0:49667 0.0.0.0:0 LISTENING
TCP 0.0.0.0:49668 0.0.0.0:0 LISTENING
TCP 0.0.0.0:49671 0.0.0.0:0 LISTENING
TCP 0.0.0.0:55952 0.0.0.0:0 LISTENING
TCP 0.0.0.0:55953 0.0.0.0:0 LISTENING
TCP 0.0.0.0:55960 0.0.0.0:0 LISTENING
TCP 0.0.0.0:55963 0.0.0.0:0 LISTENING
TCP 0.0.0.0:57999 0.0.0.0:0 LISTENING
TCP 0.0.0.0:58394 0.0.0.0:0 LISTENING
TCP 10.184.234.79:53 0.0.0.0:0 LISTENING
TCP 10.184.234.79:135 10.184.236.2:21280 ESTABLISHED
TCP 10.184.234.79:139 0.0.0.0:0 LISTENING
TCP 10.184.234.79:389 10.184.234.79:52096 ESTABLISHED
TCP 10.184.234.79:389 10.184.234.79:52111 ESTABLISHED
TCP 10.184.234.79:389 10.184.234.79:52118 ESTABLISHED
TCP 10.184.234.79:389 10.184.234.80:57994 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6484 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6497 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6499 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6501 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6504 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6512 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6516 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6517 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6525 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6526 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6529 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6535 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6548 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6560 ESTABLISHED

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 116/210
12/13/24, 4:22 PM AD1
TCP 10.184.234.79:389 10.184.236.2:6562 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6566 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6573 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6576 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6580 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6581 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6584 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6591 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6593 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6600 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6602 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6609 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6612 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6615 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6617 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6629 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6636 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6656 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6665 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6669 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6794 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6805 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6806 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6807 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6831 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6832 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6836 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6846 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6866 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6906 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6940 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6956 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6970 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7047 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7055 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7064 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7085 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7106 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7154 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7159 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7176 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6491 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6497 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6504 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6511 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6512 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6522 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6534 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6538 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6539 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6552 ESTABLISHED

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 117/210
12/13/24, 4:22 PM AD1
TCP 10.184.234.79:389 10.184.236.3:6565 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6569 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6571 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6572 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6578 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6579 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6587 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6589 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6590 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6592 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6593 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6597 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6602 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6635 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6636 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6748 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6752 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6771 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6780 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6812 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6849 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6856 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6860 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6871 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6884 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6891 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6909 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6919 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6925 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6930 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6964 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6978 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6987 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7006 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7040 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7046 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7072 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7102 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7136 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7165 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7175 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7301 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7596 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7653 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7752 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7762 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7901 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:44583 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:44778 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:44839 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:45177 ESTABLISHED

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 118/210
12/13/24, 4:22 PM AD1
TCP 10.184.234.79:389 10.184.236.3:45605 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6503 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6518 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6546 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6585 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6595 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6618 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6625 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6630 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6655 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6658 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6663 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6816 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6819 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6847 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6848 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6926 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6945 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6951 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:7050 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:7213 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:7229 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6558 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6564 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6591 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6603 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6609 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6638 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6774 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6784 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6815 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6864 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6866 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6933 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6982 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:7045 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:7123 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:7139 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:7255 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:7765 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:44581 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:44745 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:44776 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:44937 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:44941 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:45186 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:45288 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:45302 ESTABLISHED
TCP 10.184.234.79:3389 10.184.46.135:61414 ESTABLISHED
TCP 10.184.234.79:49668 10.184.234.80:58824 ESTABLISHED
TCP 10.184.234.79:52096 10.184.234.79:389 ESTABLISHED

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 119/210
12/13/24, 4:22 PM AD1
TCP 10.184.234.79:52111 10.184.234.79:389 ESTABLISHED
TCP 10.184.234.79:52118 10.184.234.79:389 ESTABLISHED
TCP 10.184.234.79:54135 10.184.234.80:51861 ESTABLISHED
TCP 10.184.234.79:54337 20.49.150.241:443 TIME_WAIT
TCP 10.184.234.79:54346 10.184.234.80:49668 TIME_WAIT
TCP 10.184.234.79:54352 10.184.234.80:49668 TIME_WAIT
TCP 10.184.234.79:54370 10.184.234.80:49668 ESTABLISHED
TCP 10.184.234.79:54371 20.190.163.21:443 ESTABLISHED
TCP 10.184.234.79:54372 20.189.173.21:443 TIME_WAIT
TCP 10.184.234.79:54388 13.107.21.239:443 ESTABLISHED
TCP 10.184.234.79:54395 52.111.240.41:443 ESTABLISHED
TCP 10.184.234.79:54398 13.107.6.158:443 ESTABLISHED
TCP 10.184.234.79:57999 10.184.234.80:53864 ESTABLISHED
TCP 127.0.0.1:53 0.0.0.0:0 LISTENING
TCP 127.0.0.1:389 127.0.0.1:52107 ESTABLISHED
TCP 127.0.0.1:389 127.0.0.1:55955 ESTABLISHED
TCP 127.0.0.1:389 127.0.0.1:55957 ESTABLISHED
TCP 127.0.0.1:52107 127.0.0.1:389 ESTABLISHED
TCP 127.0.0.1:53470 127.0.0.1:53471 ESTABLISHED
TCP 127.0.0.1:53471 127.0.0.1:53470 ESTABLISHED
TCP 127.0.0.1:53476 127.0.0.1:53477 ESTABLISHED
TCP 127.0.0.1:53477 127.0.0.1:53476 ESTABLISHED
TCP 127.0.0.1:54378 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54379 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54386 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54387 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54393 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54394 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54396 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54397 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54419 127.0.0.1:54420 ESTABLISHED
TCP 127.0.0.1:54420 127.0.0.1:54419 ESTABLISHED
TCP 127.0.0.1:54423 127.0.0.1:54424 ESTABLISHED
TCP 127.0.0.1:54424 127.0.0.1:54423 ESTABLISHED
TCP 127.0.0.1:55955 127.0.0.1:389 ESTABLISHED
TCP 127.0.0.1:55957 127.0.0.1:389 ESTABLISHED
TCP [::]:88 [::]:0 LISTENING
TCP [::]:135 [::]:0 LISTENING
TCP [::]:445 [::]:0 LISTENING
TCP [::]:464 [::]:0 LISTENING
TCP [::]:593 [::]:0 LISTENING
TCP [::]:3389 [::]:0 LISTENING
TCP [::]:5985 [::]:0 LISTENING
TCP [::]:8834 [::]:0 LISTENING
TCP [::]:9389 [::]:0 LISTENING
TCP [::]:47001 [::]:0 LISTENING
TCP [::]:49664 [::]:0 LISTENING
TCP [::]:49665 [::]:0 LISTENING
TCP [::]:49666 [::]:0 LISTENING
TCP [::]:49667 [::]:0 LISTENING
TCP [::]:49668 [::]:0 LISTENING

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 120/210
12/13/24, 4:22 PM AD1
TCP [::]:49671 [::]:0 LISTENING
TCP [::]:55952 [::]:0 LISTENING
TCP [::]:55953 [::]:0 LISTENING
TCP [::]:55960 [::]:0 LISTENING
TCP [::]:55963 [::]:0 LISTENING
TCP [::]:57999 [::]:0 LISTENING
TCP [::]:58394 [::]:0 LISTENING
TCP [::1]:53 [::]:0 LISTENING
TCP [::1]:8834 [::1]:54364 TIME_WAIT
TCP [::1]:8834 [::1]:54368 TIME_WAIT
TCP [::1]:8834 [::1]:54374 TIME_WAIT
TCP [::1]:8834 [::1]:54381 TIME_WAIT
TCP [::1]:8834 [::1]:54383 TIME_WAIT
TCP [::1]:8834 [::1]:54385 TIME_WAIT
TCP [::1]:8834 [::1]:54390 TIME_WAIT
TCP [::1]:8834 [::1]:54392 TIME_WAIT
TCP [::1]:8834 [::1]:54400 TIME_WAIT
TCP [::1]:8834 [::1]:54403 TIME_WAIT
TCP [::1]:8834 [::1]:54407 TIME_WAIT
TCP [::1]:8834 [::1]:54410 TIME_WAIT
TCP [::1]:8834 [::1]:54414 TIME_WAIT
TCP [::1]:8834 [::1]:54418 TIME_WAIT
TCP [::1]:8834 [::1]:54422 TIME_WAIT
TCP [::1]:49668 [::1]:54999 ESTABLISHED
TCP [::1]:49668 [::1]:57988 ESTABLISHED
TCP [::1]:49668 [::1]:61915 ESTABLISHED
TCP [::1]:54222 [::1]:135 TIME_WAIT
TCP [::1]:54328 [::1]:135 TIME_WAIT
TCP [::1]:54329 [::1]:49668 TIME_WAIT
TCP [::1]:54412 [::1]:8834 TIME_WAIT
TCP [::1]:54416 [::1]:8834 TIME_WAIT
TCP [::1]:54999 [::1]:49668 ESTABLISHED
TCP [::1]:57988 [::1]:49668 ESTABLISHED
TCP [::1]:61915 [::1]:49668 ESTABLISHED
UDP 0.0.0.0:123 *:*
UDP 0.0.0.0:389 *:*
UDP 0.0.0.0:3389 *:*
UDP 0.0.0.0:5353 *:*
UDP 0.0.0.0:5353 *:*
UDP 0.0.0.0:5355 *:*
UDP 0.0.0.0:51023 *:*
UDP 0.0.0.0:53021 *:*
UDP 0.0.0.0:53023 *:*
UDP 0.0.0.0:53024 *:*
UDP 0.0.0.0:53025 *:*
UDP 0.0.0.0:53026 *:*
UDP 0.0.0.0:53027 *:*
UDP 0.0.0.0:53028 *:*
UDP 0.0.0.0:53029 *:*
UDP 0.0.0.0:53030 *:*
UDP 0.0.0.0:53031 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 121/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53032 *:*
UDP 0.0.0.0:53033 *:*
UDP 0.0.0.0:53034 *:*
UDP 0.0.0.0:53035 *:*
UDP 0.0.0.0:53036 *:*
UDP 0.0.0.0:53037 *:*
UDP 0.0.0.0:53038 *:*
UDP 0.0.0.0:53039 *:*
UDP 0.0.0.0:53040 *:*
UDP 0.0.0.0:53041 *:*
UDP 0.0.0.0:53042 *:*
UDP 0.0.0.0:53043 *:*
UDP 0.0.0.0:53044 *:*
UDP 0.0.0.0:53045 *:*
UDP 0.0.0.0:53046 *:*
UDP 0.0.0.0:53047 *:*
UDP 0.0.0.0:53048 *:*
UDP 0.0.0.0:53049 *:*
UDP 0.0.0.0:53050 *:*
UDP 0.0.0.0:53051 *:*
UDP 0.0.0.0:53052 *:*
UDP 0.0.0.0:53053 *:*
UDP 0.0.0.0:53054 *:*
UDP 0.0.0.0:53055 *:*
UDP 0.0.0.0:53056 *:*
UDP 0.0.0.0:53057 *:*
UDP 0.0.0.0:53058 *:*
UDP 0.0.0.0:53059 *:*
UDP 0.0.0.0:53060 *:*
UDP 0.0.0.0:53061 *:*
UDP 0.0.0.0:53062 *:*
UDP 0.0.0.0:53063 *:*
UDP 0.0.0.0:53064 *:*
UDP 0.0.0.0:53065 *:*
UDP 0.0.0.0:53066 *:*
UDP 0.0.0.0:53067 *:*
UDP 0.0.0.0:53068 *:*
UDP 0.0.0.0:53069 *:*
UDP 0.0.0.0:53070 *:*
UDP 0.0.0.0:53071 *:*
UDP 0.0.0.0:53072 *:*
UDP 0.0.0.0:53073 *:*
UDP 0.0.0.0:53074 *:*
UDP 0.0.0.0:53075 *:*
UDP 0.0.0.0:53076 *:*
UDP 0.0.0.0:53077 *:*
UDP 0.0.0.0:53078 *:*
UDP 0.0.0.0:53079 *:*
UDP 0.0.0.0:53080 *:*
UDP 0.0.0.0:53081 *:*
UDP 0.0.0.0:53082 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 122/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53083 *:*
UDP 0.0.0.0:53084 *:*
UDP 0.0.0.0:53085 *:*
UDP 0.0.0.0:53086 *:*
UDP 0.0.0.0:53087 *:*
UDP 0.0.0.0:53088 *:*
UDP 0.0.0.0:53089 *:*
UDP 0.0.0.0:53090 *:*
UDP 0.0.0.0:53091 *:*
UDP 0.0.0.0:53092 *:*
UDP 0.0.0.0:53093 *:*
UDP 0.0.0.0:53094 *:*
UDP 0.0.0.0:53095 *:*
UDP 0.0.0.0:53096 *:*
UDP 0.0.0.0:53097 *:*
UDP 0.0.0.0:53098 *:*
UDP 0.0.0.0:53099 *:*
UDP 0.0.0.0:53100 *:*
UDP 0.0.0.0:53101 *:*
UDP 0.0.0.0:53102 *:*
UDP 0.0.0.0:53103 *:*
UDP 0.0.0.0:53104 *:*
UDP 0.0.0.0:53105 *:*
UDP 0.0.0.0:53106 *:*
UDP 0.0.0.0:53107 *:*
UDP 0.0.0.0:53108 *:*
UDP 0.0.0.0:53109 *:*
UDP 0.0.0.0:53110 *:*
UDP 0.0.0.0:53111 *:*
UDP 0.0.0.0:53112 *:*
UDP 0.0.0.0:53113 *:*
UDP 0.0.0.0:53114 *:*
UDP 0.0.0.0:53115 *:*
UDP 0.0.0.0:53116 *:*
UDP 0.0.0.0:53117 *:*
UDP 0.0.0.0:53118 *:*
UDP 0.0.0.0:53119 *:*
UDP 0.0.0.0:53120 *:*
UDP 0.0.0.0:53121 *:*
UDP 0.0.0.0:53122 *:*
UDP 0.0.0.0:53123 *:*
UDP 0.0.0.0:53124 *:*
UDP 0.0.0.0:53125 *:*
UDP 0.0.0.0:53126 *:*
UDP 0.0.0.0:53127 *:*
UDP 0.0.0.0:53128 *:*
UDP 0.0.0.0:53129 *:*
UDP 0.0.0.0:53130 *:*
UDP 0.0.0.0:53131 *:*
UDP 0.0.0.0:53132 *:*
UDP 0.0.0.0:53133 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 123/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53134 *:*
UDP 0.0.0.0:53135 *:*
UDP 0.0.0.0:53136 *:*
UDP 0.0.0.0:53137 *:*
UDP 0.0.0.0:53138 *:*
UDP 0.0.0.0:53139 *:*
UDP 0.0.0.0:53140 *:*
UDP 0.0.0.0:53141 *:*
UDP 0.0.0.0:53142 *:*
UDP 0.0.0.0:53143 *:*
UDP 0.0.0.0:53144 *:*
UDP 0.0.0.0:53145 *:*
UDP 0.0.0.0:53146 *:*
UDP 0.0.0.0:53147 *:*
UDP 0.0.0.0:53148 *:*
UDP 0.0.0.0:53149 *:*
UDP 0.0.0.0:53150 *:*
UDP 0.0.0.0:53151 *:*
UDP 0.0.0.0:53152 *:*
UDP 0.0.0.0:53153 *:*
UDP 0.0.0.0:53154 *:*
UDP 0.0.0.0:53155 *:*
UDP 0.0.0.0:53156 *:*
UDP 0.0.0.0:53157 *:*
UDP 0.0.0.0:53158 *:*
UDP 0.0.0.0:53159 *:*
UDP 0.0.0.0:53160 *:*
UDP 0.0.0.0:53161 *:*
UDP 0.0.0.0:53162 *:*
UDP 0.0.0.0:53163 *:*
UDP 0.0.0.0:53164 *:*
UDP 0.0.0.0:53165 *:*
UDP 0.0.0.0:53166 *:*
UDP 0.0.0.0:53167 *:*
UDP 0.0.0.0:53168 *:*
UDP 0.0.0.0:53169 *:*
UDP 0.0.0.0:53170 *:*
UDP 0.0.0.0:53171 *:*
UDP 0.0.0.0:53172 *:*
UDP 0.0.0.0:53173 *:*
UDP 0.0.0.0:53174 *:*
UDP 0.0.0.0:53175 *:*
UDP 0.0.0.0:53176 *:*
UDP 0.0.0.0:53177 *:*
UDP 0.0.0.0:53178 *:*
UDP 0.0.0.0:53179 *:*
UDP 0.0.0.0:53180 *:*
UDP 0.0.0.0:53181 *:*
UDP 0.0.0.0:53182 *:*
UDP 0.0.0.0:53183 *:*
UDP 0.0.0.0:53184 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 124/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53185 *:*
UDP 0.0.0.0:53186 *:*
UDP 0.0.0.0:53187 *:*
UDP 0.0.0.0:53188 *:*
UDP 0.0.0.0:53189 *:*
UDP 0.0.0.0:53190 *:*
UDP 0.0.0.0:53191 *:*
UDP 0.0.0.0:53192 *:*
UDP 0.0.0.0:53193 *:*
UDP 0.0.0.0:53194 *:*
UDP 0.0.0.0:53195 *:*
UDP 0.0.0.0:53196 *:*
UDP 0.0.0.0:53197 *:*
UDP 0.0.0.0:53198 *:*
UDP 0.0.0.0:53199 *:*
UDP 0.0.0.0:53200 *:*
UDP 0.0.0.0:53201 *:*
UDP 0.0.0.0:53202 *:*
UDP 0.0.0.0:53203 *:*
UDP 0.0.0.0:53204 *:*
UDP 0.0.0.0:53205 *:*
UDP 0.0.0.0:53206 *:*
UDP 0.0.0.0:53207 *:*
UDP 0.0.0.0:53208 *:*
UDP 0.0.0.0:53209 *:*
UDP 0.0.0.0:53210 *:*
UDP 0.0.0.0:53211 *:*
UDP 0.0.0.0:53212 *:*
UDP 0.0.0.0:53213 *:*
UDP 0.0.0.0:53214 *:*
UDP 0.0.0.0:53215 *:*
UDP 0.0.0.0:53216 *:*
UDP 0.0.0.0:53217 *:*
UDP 0.0.0.0:53218 *:*
UDP 0.0.0.0:53219 *:*
UDP 0.0.0.0:53220 *:*
UDP 0.0.0.0:53221 *:*
UDP 0.0.0.0:53222 *:*
UDP 0.0.0.0:53223 *:*
UDP 0.0.0.0:53224 *:*
UDP 0.0.0.0:53225 *:*
UDP 0.0.0.0:53226 *:*
UDP 0.0.0.0:53227 *:*
UDP 0.0.0.0:53228 *:*
UDP 0.0.0.0:53229 *:*
UDP 0.0.0.0:53230 *:*
UDP 0.0.0.0:53231 *:*
UDP 0.0.0.0:53232 *:*
UDP 0.0.0.0:53233 *:*
UDP 0.0.0.0:53234 *:*
UDP 0.0.0.0:53235 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 125/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53236 *:*
UDP 0.0.0.0:53237 *:*
UDP 0.0.0.0:53238 *:*
UDP 0.0.0.0:53239 *:*
UDP 0.0.0.0:53240 *:*
UDP 0.0.0.0:53241 *:*
UDP 0.0.0.0:53242 *:*
UDP 0.0.0.0:53243 *:*
UDP 0.0.0.0:53244 *:*
UDP 0.0.0.0:53245 *:*
UDP 0.0.0.0:53246 *:*
UDP 0.0.0.0:53247 *:*
UDP 0.0.0.0:53248 *:*
UDP 0.0.0.0:53249 *:*
UDP 0.0.0.0:53250 *:*
UDP 0.0.0.0:53251 *:*
UDP 0.0.0.0:53252 *:*
UDP 0.0.0.0:53253 *:*
UDP 0.0.0.0:53254 *:*
UDP 0.0.0.0:53255 *:*
UDP 0.0.0.0:53256 *:*
UDP 0.0.0.0:53257 *:*
UDP 0.0.0.0:53258 *:*
UDP 0.0.0.0:53259 *:*
UDP 0.0.0.0:53260 *:*
UDP 0.0.0.0:53261 *:*
UDP 0.0.0.0:53262 *:*
UDP 0.0.0.0:53263 *:*
UDP 0.0.0.0:53264 *:*
UDP 0.0.0.0:53265 *:*
UDP 0.0.0.0:53266 *:*
UDP 0.0.0.0:53267 *:*
UDP 0.0.0.0:53268 *:*
UDP 0.0.0.0:53269 *:*
UDP 0.0.0.0:53270 *:*
UDP 0.0.0.0:53271 *:*
UDP 0.0.0.0:53272 *:*
UDP 0.0.0.0:53273 *:*
UDP 0.0.0.0:53274 *:*
UDP 0.0.0.0:53275 *:*
UDP 0.0.0.0:53276 *:*
UDP 0.0.0.0:53277 *:*
UDP 0.0.0.0:53278 *:*
UDP 0.0.0.0:53279 *:*
UDP 0.0.0.0:53280 *:*
UDP 0.0.0.0:53281 *:*
UDP 0.0.0.0:53282 *:*
UDP 0.0.0.0:53283 *:*
UDP 0.0.0.0:53284 *:*
UDP 0.0.0.0:53285 *:*
UDP 0.0.0.0:53286 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 126/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53287 *:*
UDP 0.0.0.0:53288 *:*
UDP 0.0.0.0:53289 *:*
UDP 0.0.0.0:53290 *:*
UDP 0.0.0.0:53291 *:*
UDP 0.0.0.0:53292 *:*
UDP 0.0.0.0:53293 *:*
UDP 0.0.0.0:53294 *:*
UDP 0.0.0.0:53295 *:*
UDP 0.0.0.0:53296 *:*
UDP 0.0.0.0:53297 *:*
UDP 0.0.0.0:53298 *:*
UDP 0.0.0.0:53299 *:*
UDP 0.0.0.0:53300 *:*
UDP 0.0.0.0:53301 *:*
UDP 0.0.0.0:53302 *:*
UDP 0.0.0.0:53303 *:*
UDP 0.0.0.0:53304 *:*
UDP 0.0.0.0:53305 *:*
UDP 0.0.0.0:53306 *:*
UDP 0.0.0.0:53307 *:*
UDP 0.0.0.0:53308 *:*
UDP 0.0.0.0:53309 *:*
UDP 0.0.0.0:53310 *:*
UDP 0.0.0.0:53311 *:*
UDP 0.0.0.0:53312 *:*
UDP 0.0.0.0:53313 *:*
UDP 0.0.0.0:53314 *:*
UDP 0.0.0.0:53315 *:*
UDP 0.0.0.0:53316 *:*
UDP 0.0.0.0:53317 *:*
UDP 0.0.0.0:53318 *:*
UDP 0.0.0.0:53319 *:*
UDP 0.0.0.0:53320 *:*
UDP 0.0.0.0:53321 *:*
UDP 0.0.0.0:53322 *:*
UDP 0.0.0.0:53323 *:*
UDP 0.0.0.0:53324 *:*
UDP 0.0.0.0:53325 *:*
UDP 0.0.0.0:53326 *:*
UDP 0.0.0.0:53327 *:*
UDP 0.0.0.0:53328 *:*
UDP 0.0.0.0:53329 *:*
UDP 0.0.0.0:53330 *:*
UDP 0.0.0.0:53331 *:*
UDP 0.0.0.0:53332 *:*
UDP 0.0.0.0:53333 *:*
UDP 0.0.0.0:53334 *:*
UDP 0.0.0.0:53335 *:*
UDP 0.0.0.0:53336 *:*
UDP 0.0.0.0:53337 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 127/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53338 *:*
UDP 0.0.0.0:53339 *:*
UDP 0.0.0.0:53340 *:*
UDP 0.0.0.0:53341 *:*
UDP 0.0.0.0:53342 *:*
UDP 0.0.0.0:53343 *:*
UDP 0.0.0.0:53344 *:*
UDP 0.0.0.0:53345 *:*
UDP 0.0.0.0:53346 *:*
UDP 0.0.0.0:53347 *:*
UDP 0.0.0.0:53348 *:*
UDP 0.0.0.0:53349 *:*
UDP 0.0.0.0:53350 *:*
UDP 0.0.0.0:53351 *:*
UDP 0.0.0.0:53352 *:*
UDP 0.0.0.0:53353 *:*
UDP 0.0.0.0:53354 *:*
UDP 0.0.0.0:53355 *:*
UDP 0.0.0.0:53356 *:*
UDP 0.0.0.0:53357 *:*
UDP 0.0.0.0:53358 *:*
UDP 0.0.0.0:53359 *:*
UDP 0.0.0.0:53360 *:*
UDP 0.0.0.0:53361 *:*
UDP 0.0.0.0:53362 *:*
UDP 0.0.0.0:53363 *:*
UDP 0.0.0.0:53364 *:*
UDP 0.0.0.0:53365 *:*
UDP 0.0.0.0:53366 *:*
UDP 0.0.0.0:53367 *:*
UDP 0.0.0.0:53368 *:*
UDP 0.0.0.0:53369 *:*
UDP 0.0.0.0:53370 *:*
UDP 0.0.0.0:53371 *:*
UDP 0.0.0.0:53372 *:*
UDP 0.0.0.0:53373 *:*
UDP 0.0.0.0:53374 *:*
UDP 0.0.0.0:53375 *:*
UDP 0.0.0.0:53376 *:*
UDP 0.0.0.0:53377 *:*
UDP 0.0.0.0:53378 *:*
UDP 0.0.0.0:53379 *:*
UDP 0.0.0.0:53380 *:*
UDP 0.0.0.0:53381 *:*
UDP 0.0.0.0:53382 *:*
UDP 0.0.0.0:53383 *:*
UDP 0.0.0.0:53384 *:*
UDP 0.0.0.0:53385 *:*
UDP 0.0.0.0:53386 *:*
UDP 0.0.0.0:53387 *:*
UDP 0.0.0.0:53388 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 128/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53389 *:*
UDP 0.0.0.0:53390 *:*
UDP 0.0.0.0:53391 *:*
UDP 0.0.0.0:53392 *:*
UDP 0.0.0.0:53393 *:*
UDP 0.0.0.0:53394 *:*
UDP 0.0.0.0:53396 *:*
UDP 0.0.0.0:53397 *:*
UDP 0.0.0.0:53398 *:*
UDP 0.0.0.0:53399 *:*
UDP 0.0.0.0:53400 *:*
UDP 0.0.0.0:53401 *:*
UDP 0.0.0.0:53402 *:*
UDP 0.0.0.0:53403 *:*
UDP 0.0.0.0:53404 *:*
UDP 0.0.0.0:53405 *:*
UDP 0.0.0.0:53406 *:*
UDP 0.0.0.0:53407 *:*
UDP 0.0.0.0:53408 *:*
UDP 0.0.0.0:53409 *:*
UDP 0.0.0.0:53410 *:*
UDP 0.0.0.0:53411 *:*
UDP 0.0.0.0:53412 *:*
UDP 0.0.0.0:53413 *:*
UDP 0.0.0.0:53414 *:*
UDP 0.0.0.0:53415 *:*
UDP 0.0.0.0:53416 *:*
UDP 0.0.0.0:53417 *:*
UDP 0.0.0.0:53418 *:*
UDP 0.0.0.0:53419 *:*
UDP 0.0.0.0:53420 *:*
UDP 0.0.0.0:53421 *:*
UDP 0.0.0.0:53422 *:*
UDP 0.0.0.0:53423 *:*
UDP 0.0.0.0:53424 *:*
UDP 0.0.0.0:53425 *:*
UDP 0.0.0.0:53426 *:*
UDP 0.0.0.0:53427 *:*
UDP 0.0.0.0:53428 *:*
UDP 0.0.0.0:53429 *:*
UDP 0.0.0.0:53430 *:*
UDP 0.0.0.0:53431 *:*
UDP 0.0.0.0:53432 *:*
UDP 0.0.0.0:53433 *:*
UDP 0.0.0.0:53434 *:*
UDP 0.0.0.0:53435 *:*
UDP 0.0.0.0:53436 *:*
UDP 0.0.0.0:53437 *:*
UDP 0.0.0.0:53438 *:*
UDP 0.0.0.0:53439 *:*
UDP 0.0.0.0:53440 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 129/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53441 *:*
UDP 0.0.0.0:53442 *:*
UDP 0.0.0.0:53443 *:*
UDP 0.0.0.0:53444 *:*
UDP 0.0.0.0:53445 *:*
UDP 0.0.0.0:53446 *:*
UDP 0.0.0.0:53447 *:*
UDP 0.0.0.0:53448 *:*
UDP 0.0.0.0:53449 *:*
UDP 0.0.0.0:53450 *:*
UDP 0.0.0.0:53451 *:*
UDP 0.0.0.0:53452 *:*
UDP 0.0.0.0:53453 *:*
UDP 0.0.0.0:53454 *:*
UDP 0.0.0.0:53455 *:*
UDP 0.0.0.0:53456 *:*
UDP 0.0.0.0:53457 *:*
UDP 0.0.0.0:53458 *:*
UDP 0.0.0.0:53459 *:*
UDP 0.0.0.0:53460 *:*
UDP 0.0.0.0:53461 *:*
UDP 0.0.0.0:53462 *:*
UDP 0.0.0.0:53463 *:*
UDP 0.0.0.0:53464 *:*
UDP 0.0.0.0:53465 *:*
UDP 0.0.0.0:53466 *:*
UDP 0.0.0.0:53467 *:*
UDP 0.0.0.0:53468 *:*
UDP 0.0.0.0:53469 *:*
UDP 0.0.0.0:53470 *:*
UDP 0.0.0.0:53471 *:*
UDP 0.0.0.0:53472 *:*
UDP 0.0.0.0:53473 *:*
UDP 0.0.0.0:53474 *:*
UDP 0.0.0.0:53475 *:*
UDP 0.0.0.0:53476 *:*
UDP 0.0.0.0:53477 *:*
UDP 0.0.0.0:53478 *:*
UDP 0.0.0.0:53479 *:*
UDP 0.0.0.0:53480 *:*
UDP 0.0.0.0:53481 *:*
UDP 0.0.0.0:53482 *:*
UDP 0.0.0.0:53483 *:*
UDP 0.0.0.0:53484 *:*
UDP 0.0.0.0:53485 *:*
UDP 0.0.0.0:53486 *:*
UDP 0.0.0.0:53487 *:*
UDP 0.0.0.0:53488 *:*
UDP 0.0.0.0:53489 *:*
UDP 0.0.0.0:53490 *:*
UDP 0.0.0.0:53491 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 130/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53492 *:*
UDP 0.0.0.0:53493 *:*
UDP 0.0.0.0:53494 *:*
UDP 0.0.0.0:53495 *:*
UDP 0.0.0.0:53496 *:*
UDP 0.0.0.0:53497 *:*
UDP 0.0.0.0:53498 *:*
UDP 0.0.0.0:53499 *:*
UDP 0.0.0.0:53500 *:*
UDP 0.0.0.0:53501 *:*
UDP 0.0.0.0:53502 *:*
UDP 0.0.0.0:53503 *:*
UDP 0.0.0.0:53504 *:*
UDP 0.0.0.0:53505 *:*
UDP 0.0.0.0:53506 *:*
UDP 0.0.0.0:53507 *:*
UDP 0.0.0.0:53508 *:*
UDP 0.0.0.0:53509 *:*
UDP 0.0.0.0:53510 *:*
UDP 0.0.0.0:53511 *:*
UDP 0.0.0.0:53512 *:*
UDP 0.0.0.0:53513 *:*
UDP 0.0.0.0:53514 *:*
UDP 0.0.0.0:53515 *:*
UDP 0.0.0.0:53516 *:*
UDP 0.0.0.0:53517 *:*
UDP 0.0.0.0:53518 *:*
UDP 0.0.0.0:53519 *:*
UDP 0.0.0.0:53520 *:*
UDP 0.0.0.0:53521 *:*
UDP 0.0.0.0:53522 *:*
UDP 0.0.0.0:53523 *:*
UDP 0.0.0.0:53524 *:*
UDP 0.0.0.0:53525 *:*
UDP 0.0.0.0:53526 *:*
UDP 0.0.0.0:53527 *:*
UDP 0.0.0.0:53528 *:*
UDP 0.0.0.0:53529 *:*
UDP 0.0.0.0:53530 *:*
UDP 0.0.0.0:53531 *:*
UDP 0.0.0.0:53532 *:*
UDP 0.0.0.0:53533 *:*
UDP 0.0.0.0:53534 *:*
UDP 0.0.0.0:53535 *:*
UDP 0.0.0.0:53536 *:*
UDP 0.0.0.0:53537 *:*
UDP 0.0.0.0:53538 *:*
UDP 0.0.0.0:53539 *:*
UDP 0.0.0.0:53540 *:*
UDP 0.0.0.0:53541 *:*
UDP 0.0.0.0:53542 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 131/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53543 *:*
UDP 0.0.0.0:53544 *:*
UDP 0.0.0.0:53545 *:*
UDP 0.0.0.0:53546 *:*
UDP 0.0.0.0:53547 *:*
UDP 0.0.0.0:53548 *:*
UDP 0.0.0.0:53549 *:*
UDP 0.0.0.0:53550 *:*
UDP 0.0.0.0:53551 *:*
UDP 0.0.0.0:53552 *:*
UDP 0.0.0.0:53553 *:*
UDP 0.0.0.0:53554 *:*
UDP 0.0.0.0:53555 *:*
UDP 0.0.0.0:53556 *:*
UDP 0.0.0.0:53557 *:*
UDP 0.0.0.0:53558 *:*
UDP 0.0.0.0:53559 *:*
UDP 0.0.0.0:53560 *:*
UDP 0.0.0.0:53561 *:*
UDP 0.0.0.0:53562 *:*
UDP 0.0.0.0:53563 *:*
UDP 0.0.0.0:53564 *:*
UDP 0.0.0.0:53565 *:*
UDP 0.0.0.0:53566 *:*
UDP 0.0.0.0:53567 *:*
UDP 0.0.0.0:53568 *:*
UDP 0.0.0.0:53569 *:*
UDP 0.0.0.0:53570 *:*
UDP 0.0.0.0:53571 *:*
UDP 0.0.0.0:53572 *:*
UDP 0.0.0.0:53573 *:*
UDP 0.0.0.0:53574 *:*
UDP 0.0.0.0:53575 *:*
UDP 0.0.0.0:53576 *:*
UDP 0.0.0.0:53577 *:*
UDP 0.0.0.0:53578 *:*
UDP 0.0.0.0:53579 *:*
UDP 0.0.0.0:53580 *:*
UDP 0.0.0.0:53581 *:*
UDP 0.0.0.0:53582 *:*
UDP 0.0.0.0:53583 *:*
UDP 0.0.0.0:53584 *:*
UDP 0.0.0.0:53585 *:*
UDP 0.0.0.0:53586 *:*
UDP 0.0.0.0:53587 *:*
UDP 0.0.0.0:53588 *:*
UDP 0.0.0.0:53589 *:*
UDP 0.0.0.0:53590 *:*
UDP 0.0.0.0:53591 *:*
UDP 0.0.0.0:53592 *:*
UDP 0.0.0.0:53593 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 132/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53594 *:*
UDP 0.0.0.0:53595 *:*
UDP 0.0.0.0:53596 *:*
UDP 0.0.0.0:53597 *:*
UDP 0.0.0.0:53598 *:*
UDP 0.0.0.0:53599 *:*
UDP 0.0.0.0:53600 *:*
UDP 0.0.0.0:53601 *:*
UDP 0.0.0.0:53602 *:*
UDP 0.0.0.0:53603 *:*
UDP 0.0.0.0:53604 *:*
UDP 0.0.0.0:53605 *:*
UDP 0.0.0.0:53606 *:*
UDP 0.0.0.0:53607 *:*
UDP 0.0.0.0:53608 *:*
UDP 0.0.0.0:53609 *:*
UDP 0.0.0.0:53610 *:*
UDP 0.0.0.0:53611 *:*
UDP 0.0.0.0:53612 *:*
UDP 0.0.0.0:53613 *:*
UDP 0.0.0.0:53614 *:*
UDP 0.0.0.0:53615 *:*
UDP 0.0.0.0:53616 *:*
UDP 0.0.0.0:53617 *:*
UDP 0.0.0.0:53618 *:*
UDP 0.0.0.0:53619 *:*
UDP 0.0.0.0:53620 *:*
UDP 0.0.0.0:53621 *:*
UDP 0.0.0.0:53622 *:*
UDP 0.0.0.0:53623 *:*
UDP 0.0.0.0:53624 *:*
UDP 0.0.0.0:53625 *:*
UDP 0.0.0.0:53626 *:*
UDP 0.0.0.0:53627 *:*
UDP 0.0.0.0:53628 *:*
UDP 0.0.0.0:53629 *:*
UDP 0.0.0.0:53630 *:*
UDP 0.0.0.0:53631 *:*
UDP 0.0.0.0:53632 *:*
UDP 0.0.0.0:53633 *:*
UDP 0.0.0.0:53634 *:*
UDP 0.0.0.0:53635 *:*
UDP 0.0.0.0:53636 *:*
UDP 0.0.0.0:53637 *:*
UDP 0.0.0.0:53638 *:*
UDP 0.0.0.0:53639 *:*
UDP 0.0.0.0:53640 *:*
UDP 0.0.0.0:53641 *:*
UDP 0.0.0.0:53642 *:*
UDP 0.0.0.0:53643 *:*
UDP 0.0.0.0:53644 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 133/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53645 *:*
UDP 0.0.0.0:53646 *:*
UDP 0.0.0.0:53647 *:*
UDP 0.0.0.0:53648 *:*
UDP 0.0.0.0:53649 *:*
UDP 0.0.0.0:53650 *:*
UDP 0.0.0.0:53651 *:*
UDP 0.0.0.0:53652 *:*
UDP 0.0.0.0:53653 *:*
UDP 0.0.0.0:53654 *:*
UDP 0.0.0.0:53655 *:*
UDP 0.0.0.0:53656 *:*
UDP 0.0.0.0:53657 *:*
UDP 0.0.0.0:53658 *:*
UDP 0.0.0.0:53659 *:*
UDP 0.0.0.0:53660 *:*
UDP 0.0.0.0:53661 *:*
UDP 0.0.0.0:53662 *:*
UDP 0.0.0.0:53663 *:*
UDP 0.0.0.0:53664 *:*
UDP 0.0.0.0:53665 *:*
UDP 0.0.0.0:53666 *:*
UDP 0.0.0.0:53667 *:*
UDP 0.0.0.0:53668 *:*
UDP 0.0.0.0:53669 *:*
UDP 0.0.0.0:53670 *:*
UDP 0.0.0.0:53671 *:*
UDP 0.0.0.0:53672 *:*
UDP 0.0.0.0:53673 *:*
UDP 0.0.0.0:53674 *:*
UDP 0.0.0.0:53675 *:*
UDP 0.0.0.0:53676 *:*
UDP 0.0.0.0:53677 *:*
UDP 0.0.0.0:53678 *:*
UDP 0.0.0.0:53679 *:*
UDP 0.0.0.0:53680 *:*
UDP 0.0.0.0:53681 *:*
UDP 0.0.0.0:53682 *:*
UDP 0.0.0.0:53683 *:*
UDP 0.0.0.0:53684 *:*
UDP 0.0.0.0:53685 *:*
UDP 0.0.0.0:53686 *:*
UDP 0.0.0.0:53687 *:*
UDP 0.0.0.0:53688 *:*
UDP 0.0.0.0:53689 *:*
UDP 0.0.0.0:53690 *:*
UDP 0.0.0.0:53691 *:*
UDP 0.0.0.0:53692 *:*
UDP 0.0.0.0:53693 *:*
UDP 0.0.0.0:53694 *:*
UDP 0.0.0.0:53695 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 134/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53696 *:*
UDP 0.0.0.0:53697 *:*
UDP 0.0.0.0:53698 *:*
UDP 0.0.0.0:53699 *:*
UDP 0.0.0.0:53700 *:*
UDP 0.0.0.0:53701 *:*
UDP 0.0.0.0:53702 *:*
UDP 0.0.0.0:53703 *:*
UDP 0.0.0.0:53704 *:*
UDP 0.0.0.0:53705 *:*
UDP 0.0.0.0:53706 *:*
UDP 0.0.0.0:53707 *:*
UDP 0.0.0.0:53708 *:*
UDP 0.0.0.0:53709 *:*
UDP 0.0.0.0:53710 *:*
UDP 0.0.0.0:53711 *:*
UDP 0.0.0.0:53712 *:*
UDP 0.0.0.0:53713 *:*
UDP 0.0.0.0:53714 *:*
UDP 0.0.0.0:53715 *:*
UDP 0.0.0.0:53716 *:*
UDP 0.0.0.0:53717 *:*
UDP 0.0.0.0:53718 *:*
UDP 0.0.0.0:53719 *:*
UDP 0.0.0.0:53720 *:*
UDP 0.0.0.0:53721 *:*
UDP 0.0.0.0:53722 *:*
UDP 0.0.0.0:53723 *:*
UDP 0.0.0.0:53724 *:*
UDP 0.0.0.0:53725 *:*
UDP 0.0.0.0:53726 *:*
UDP 0.0.0.0:53727 *:*
UDP 0.0.0.0:53728 *:*
UDP 0.0.0.0:53729 *:*
UDP 0.0.0.0:53730 *:*
UDP 0.0.0.0:53731 *:*
UDP 0.0.0.0:53732 *:*
UDP 0.0.0.0:53733 *:*
UDP 0.0.0.0:53734 *:*
UDP 0.0.0.0:53735 *:*
UDP 0.0.0.0:53736 *:*
UDP 0.0.0.0:53737 *:*
UDP 0.0.0.0:53738 *:*
UDP 0.0.0.0:53739 *:*
UDP 0.0.0.0:53740 *:*
UDP 0.0.0.0:53741 *:*
UDP 0.0.0.0:53742 *:*
UDP 0.0.0.0:53743 *:*
UDP 0.0.0.0:53744 *:*
UDP 0.0.0.0:53745 *:*
UDP 0.0.0.0:53746 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 135/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53747 *:*
UDP 0.0.0.0:53748 *:*
UDP 0.0.0.0:53749 *:*
UDP 0.0.0.0:53750 *:*
UDP 0.0.0.0:53751 *:*
UDP 0.0.0.0:53752 *:*
UDP 0.0.0.0:53753 *:*
UDP 0.0.0.0:53754 *:*
UDP 0.0.0.0:53755 *:*
UDP 0.0.0.0:53756 *:*
UDP 0.0.0.0:53757 *:*
UDP 0.0.0.0:53758 *:*
UDP 0.0.0.0:53759 *:*
UDP 0.0.0.0:53760 *:*
UDP 0.0.0.0:53761 *:*
UDP 0.0.0.0:53762 *:*
UDP 0.0.0.0:53763 *:*
UDP 0.0.0.0:53764 *:*
UDP 0.0.0.0:53765 *:*
UDP 0.0.0.0:53766 *:*
UDP 0.0.0.0:53767 *:*
UDP 0.0.0.0:53768 *:*
UDP 0.0.0.0:53769 *:*
UDP 0.0.0.0:53770 *:*
UDP 0.0.0.0:53771 *:*
UDP 0.0.0.0:53772 *:*
UDP 0.0.0.0:53773 *:*
UDP 0.0.0.0:53774 *:*
UDP 0.0.0.0:53775 *:*
UDP 0.0.0.0:53776 *:*
UDP 0.0.0.0:53777 *:*
UDP 0.0.0.0:53778 *:*
UDP 0.0.0.0:53779 *:*
UDP 0.0.0.0:53780 *:*
UDP 0.0.0.0:53781 *:*
UDP 0.0.0.0:53782 *:*
UDP 0.0.0.0:53783 *:*
UDP 0.0.0.0:53784 *:*
UDP 0.0.0.0:53785 *:*
UDP 0.0.0.0:53786 *:*
UDP 0.0.0.0:53787 *:*
UDP 0.0.0.0:53788 *:*
UDP 0.0.0.0:53789 *:*
UDP 0.0.0.0:53790 *:*
UDP 0.0.0.0:53791 *:*
UDP 0.0.0.0:53792 *:*
UDP 0.0.0.0:53793 *:*
UDP 0.0.0.0:53794 *:*
UDP 0.0.0.0:53795 *:*
UDP 0.0.0.0:53796 *:*
UDP 0.0.0.0:53797 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 136/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53798 *:*
UDP 0.0.0.0:53799 *:*
UDP 0.0.0.0:53800 *:*
UDP 0.0.0.0:53801 *:*
UDP 0.0.0.0:53802 *:*
UDP 0.0.0.0:53803 *:*
UDP 0.0.0.0:53804 *:*
UDP 0.0.0.0:53805 *:*
UDP 0.0.0.0:53806 *:*
UDP 0.0.0.0:53807 *:*
UDP 0.0.0.0:53808 *:*
UDP 0.0.0.0:53809 *:*
UDP 0.0.0.0:53810 *:*
UDP 0.0.0.0:53811 *:*
UDP 0.0.0.0:53812 *:*
UDP 0.0.0.0:53813 *:*
UDP 0.0.0.0:53814 *:*
UDP 0.0.0.0:53815 *:*
UDP 0.0.0.0:53816 *:*
UDP 0.0.0.0:53817 *:*
UDP 0.0.0.0:53818 *:*
UDP 0.0.0.0:53819 *:*
UDP 0.0.0.0:53820 *:*
UDP 0.0.0.0:53821 *:*
UDP 0.0.0.0:53822 *:*
UDP 0.0.0.0:53823 *:*
UDP 0.0.0.0:53824 *:*
UDP 0.0.0.0:53825 *:*
UDP 0.0.0.0:53826 *:*
UDP 0.0.0.0:53827 *:*
UDP 0.0.0.0:53828 *:*
UDP 0.0.0.0:53829 *:*
UDP 0.0.0.0:53830 *:*
UDP 0.0.0.0:53831 *:*
UDP 0.0.0.0:53832 *:*
UDP 0.0.0.0:53833 *:*
UDP 0.0.0.0:53834 *:*
UDP 0.0.0.0:53835 *:*
UDP 0.0.0.0:53836 *:*
UDP 0.0.0.0:53837 *:*
UDP 0.0.0.0:53838 *:*
UDP 0.0.0.0:53839 *:*
UDP 0.0.0.0:53840 *:*
UDP 0.0.0.0:53841 *:*
UDP 0.0.0.0:53842 *:*
UDP 0.0.0.0:53843 *:*
UDP 0.0.0.0:53844 *:*
UDP 0.0.0.0:53845 *:*
UDP 0.0.0.0:53846 *:*
UDP 0.0.0.0:53847 *:*
UDP 0.0.0.0:53848 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 137/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53849 *:*
UDP 0.0.0.0:53850 *:*
UDP 0.0.0.0:53851 *:*
UDP 0.0.0.0:53852 *:*
UDP 0.0.0.0:53853 *:*
UDP 0.0.0.0:53854 *:*
UDP 0.0.0.0:53855 *:*
UDP 0.0.0.0:53856 *:*
UDP 0.0.0.0:53857 *:*
UDP 0.0.0.0:53858 *:*
UDP 0.0.0.0:53859 *:*
UDP 0.0.0.0:53860 *:*
UDP 0.0.0.0:53861 *:*
UDP 0.0.0.0:53862 *:*
UDP 0.0.0.0:53863 *:*
UDP 0.0.0.0:53864 *:*
UDP 0.0.0.0:53865 *:*
UDP 0.0.0.0:53866 *:*
UDP 0.0.0.0:53867 *:*
UDP 0.0.0.0:53868 *:*
UDP 0.0.0.0:53869 *:*
UDP 0.0.0.0:53870 *:*
UDP 0.0.0.0:53871 *:*
UDP 0.0.0.0:53872 *:*
UDP 0.0.0.0:53873 *:*
UDP 0.0.0.0:53874 *:*
UDP 0.0.0.0:53875 *:*
UDP 0.0.0.0:53876 *:*
UDP 0.0.0.0:53877 *:*
UDP 0.0.0.0:53878 *:*
UDP 0.0.0.0:53879 *:*
UDP 0.0.0.0:53880 *:*
UDP 0.0.0.0:53881 *:*
UDP 0.0.0.0:53882 *:*
UDP 0.0.0.0:53883 *:*
UDP 0.0.0.0:53884 *:*
UDP 0.0.0.0:53885 *:*
UDP 0.0.0.0:53886 *:*
UDP 0.0.0.0:53887 *:*
UDP 0.0.0.0:53888 *:*
UDP 0.0.0.0:53889 *:*
UDP 0.0.0.0:53890 *:*
UDP 0.0.0.0:53891 *:*
UDP 0.0.0.0:53892 *:*
UDP 0.0.0.0:53893 *:*
UDP 0.0.0.0:53894 *:*
UDP 0.0.0.0:53895 *:*
UDP 0.0.0.0:53896 *:*
UDP 0.0.0.0:53897 *:*
UDP 0.0.0.0:53898 *:*
UDP 0.0.0.0:53899 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 138/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53900 *:*
UDP 0.0.0.0:53901 *:*
UDP 0.0.0.0:53902 *:*
UDP 0.0.0.0:53903 *:*
UDP 0.0.0.0:53904 *:*
UDP 0.0.0.0:53905 *:*
UDP 0.0.0.0:53906 *:*
UDP 0.0.0.0:53907 *:*
UDP 0.0.0.0:53908 *:*
UDP 0.0.0.0:53909 *:*
UDP 0.0.0.0:53910 *:*
UDP 0.0.0.0:53911 *:*
UDP 0.0.0.0:53912 *:*
UDP 0.0.0.0:53913 *:*
UDP 0.0.0.0:53914 *:*
UDP 0.0.0.0:53915 *:*
UDP 0.0.0.0:53916 *:*
UDP 0.0.0.0:53917 *:*
UDP 0.0.0.0:53918 *:*
UDP 0.0.0.0:53919 *:*
UDP 0.0.0.0:53920 *:*
UDP 0.0.0.0:53921 *:*
UDP 0.0.0.0:53922 *:*
UDP 0.0.0.0:53923 *:*
UDP 0.0.0.0:53924 *:*
UDP 0.0.0.0:53925 *:*
UDP 0.0.0.0:53926 *:*
UDP 0.0.0.0:53927 *:*
UDP 0.0.0.0:53928 *:*
UDP 0.0.0.0:53929 *:*
UDP 0.0.0.0:53930 *:*
UDP 0.0.0.0:53931 *:*
UDP 0.0.0.0:53932 *:*
UDP 0.0.0.0:53933 *:*
UDP 0.0.0.0:53934 *:*
UDP 0.0.0.0:53935 *:*
UDP 0.0.0.0:53936 *:*
UDP 0.0.0.0:53937 *:*
UDP 0.0.0.0:53938 *:*
UDP 0.0.0.0:53939 *:*
UDP 0.0.0.0:53940 *:*
UDP 0.0.0.0:53941 *:*
UDP 0.0.0.0:53942 *:*
UDP 0.0.0.0:53943 *:*
UDP 0.0.0.0:53944 *:*
UDP 0.0.0.0:53945 *:*
UDP 0.0.0.0:53946 *:*
UDP 0.0.0.0:53947 *:*
UDP 0.0.0.0:53948 *:*
UDP 0.0.0.0:53949 *:*
UDP 0.0.0.0:53950 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 139/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53951 *:*
UDP 0.0.0.0:53952 *:*
UDP 0.0.0.0:53953 *:*
UDP 0.0.0.0:53954 *:*
UDP 0.0.0.0:53955 *:*
UDP 0.0.0.0:53956 *:*
UDP 0.0.0.0:53957 *:*
UDP 0.0.0.0:53958 *:*
UDP 0.0.0.0:53959 *:*
UDP 0.0.0.0:53960 *:*
UDP 0.0.0.0:53961 *:*
UDP 0.0.0.0:53962 *:*
UDP 0.0.0.0:53963 *:*
UDP 0.0.0.0:53964 *:*
UDP 0.0.0.0:53965 *:*
UDP 0.0.0.0:53966 *:*
UDP 0.0.0.0:53967 *:*
UDP 0.0.0.0:53968 *:*
UDP 0.0.0.0:53969 *:*
UDP 0.0.0.0:53970 *:*
UDP 0.0.0.0:53971 *:*
UDP 0.0.0.0:53972 *:*
UDP 0.0.0.0:53973 *:*
UDP 0.0.0.0:53974 *:*
UDP 0.0.0.0:53975 *:*
UDP 0.0.0.0:53976 *:*
UDP 0.0.0.0:53977 *:*
UDP 0.0.0.0:53978 *:*
UDP 0.0.0.0:53979 *:*
UDP 0.0.0.0:53980 *:*
UDP 0.0.0.0:53981 *:*
UDP 0.0.0.0:53982 *:*
UDP 0.0.0.0:53983 *:*
UDP 0.0.0.0:53984 *:*
UDP 0.0.0.0:53985 *:*
UDP 0.0.0.0:53986 *:*
UDP 0.0.0.0:53987 *:*
UDP 0.0.0.0:53988 *:*
UDP 0.0.0.0:53989 *:*
UDP 0.0.0.0:53990 *:*
UDP 0.0.0.0:53991 *:*
UDP 0.0.0.0:53992 *:*
UDP 0.0.0.0:53993 *:*
UDP 0.0.0.0:53994 *:*
UDP 0.0.0.0:53995 *:*
UDP 0.0.0.0:53996 *:*
UDP 0.0.0.0:53997 *:*
UDP 0.0.0.0:53998 *:*
UDP 0.0.0.0:53999 *:*
UDP 0.0.0.0:54000 *:*
UDP 0.0.0.0:54001 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 140/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54002 *:*
UDP 0.0.0.0:54003 *:*
UDP 0.0.0.0:54004 *:*
UDP 0.0.0.0:54005 *:*
UDP 0.0.0.0:54006 *:*
UDP 0.0.0.0:54007 *:*
UDP 0.0.0.0:54008 *:*
UDP 0.0.0.0:54009 *:*
UDP 0.0.0.0:54010 *:*
UDP 0.0.0.0:54011 *:*
UDP 0.0.0.0:54012 *:*
UDP 0.0.0.0:54013 *:*
UDP 0.0.0.0:54014 *:*
UDP 0.0.0.0:54015 *:*
UDP 0.0.0.0:54016 *:*
UDP 0.0.0.0:54017 *:*
UDP 0.0.0.0:54018 *:*
UDP 0.0.0.0:54019 *:*
UDP 0.0.0.0:54020 *:*
UDP 0.0.0.0:54021 *:*
UDP 0.0.0.0:54022 *:*
UDP 0.0.0.0:54023 *:*
UDP 0.0.0.0:54024 *:*
UDP 0.0.0.0:54025 *:*
UDP 0.0.0.0:54026 *:*
UDP 0.0.0.0:54027 *:*
UDP 0.0.0.0:54028 *:*
UDP 0.0.0.0:54029 *:*
UDP 0.0.0.0:54030 *:*
UDP 0.0.0.0:54031 *:*
UDP 0.0.0.0:54032 *:*
UDP 0.0.0.0:54033 *:*
UDP 0.0.0.0:54034 *:*
UDP 0.0.0.0:54035 *:*
UDP 0.0.0.0:54036 *:*
UDP 0.0.0.0:54037 *:*
UDP 0.0.0.0:54038 *:*
UDP 0.0.0.0:54039 *:*
UDP 0.0.0.0:54040 *:*
UDP 0.0.0.0:54041 *:*
UDP 0.0.0.0:54042 *:*
UDP 0.0.0.0:54043 *:*
UDP 0.0.0.0:54044 *:*
UDP 0.0.0.0:54045 *:*
UDP 0.0.0.0:54046 *:*
UDP 0.0.0.0:54047 *:*
UDP 0.0.0.0:54048 *:*
UDP 0.0.0.0:54049 *:*
UDP 0.0.0.0:54050 *:*
UDP 0.0.0.0:54051 *:*
UDP 0.0.0.0:54052 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 141/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54053 *:*
UDP 0.0.0.0:54054 *:*
UDP 0.0.0.0:54055 *:*
UDP 0.0.0.0:54056 *:*
UDP 0.0.0.0:54057 *:*
UDP 0.0.0.0:54058 *:*
UDP 0.0.0.0:54059 *:*
UDP 0.0.0.0:54060 *:*
UDP 0.0.0.0:54061 *:*
UDP 0.0.0.0:54062 *:*
UDP 0.0.0.0:54063 *:*
UDP 0.0.0.0:54064 *:*
UDP 0.0.0.0:54065 *:*
UDP 0.0.0.0:54066 *:*
UDP 0.0.0.0:54067 *:*
UDP 0.0.0.0:54068 *:*
UDP 0.0.0.0:54069 *:*
UDP 0.0.0.0:54070 *:*
UDP 0.0.0.0:54071 *:*
UDP 0.0.0.0:54072 *:*
UDP 0.0.0.0:54073 *:*
UDP 0.0.0.0:54074 *:*
UDP 0.0.0.0:54075 *:*
UDP 0.0.0.0:54076 *:*
UDP 0.0.0.0:54077 *:*
UDP 0.0.0.0:54078 *:*
UDP 0.0.0.0:54079 *:*
UDP 0.0.0.0:54080 *:*
UDP 0.0.0.0:54081 *:*
UDP 0.0.0.0:54082 *:*
UDP 0.0.0.0:54083 *:*
UDP 0.0.0.0:54084 *:*
UDP 0.0.0.0:54085 *:*
UDP 0.0.0.0:54086 *:*
UDP 0.0.0.0:54087 *:*
UDP 0.0.0.0:54088 *:*
UDP 0.0.0.0:54089 *:*
UDP 0.0.0.0:54090 *:*
UDP 0.0.0.0:54091 *:*
UDP 0.0.0.0:54092 *:*
UDP 0.0.0.0:54093 *:*
UDP 0.0.0.0:54094 *:*
UDP 0.0.0.0:54095 *:*
UDP 0.0.0.0:54096 *:*
UDP 0.0.0.0:54097 *:*
UDP 0.0.0.0:54098 *:*
UDP 0.0.0.0:54099 *:*
UDP 0.0.0.0:54100 *:*
UDP 0.0.0.0:54101 *:*
UDP 0.0.0.0:54102 *:*
UDP 0.0.0.0:54103 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 142/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54104 *:*
UDP 0.0.0.0:54105 *:*
UDP 0.0.0.0:54106 *:*
UDP 0.0.0.0:54107 *:*
UDP 0.0.0.0:54108 *:*
UDP 0.0.0.0:54109 *:*
UDP 0.0.0.0:54110 *:*
UDP 0.0.0.0:54111 *:*
UDP 0.0.0.0:54112 *:*
UDP 0.0.0.0:54113 *:*
UDP 0.0.0.0:54114 *:*
UDP 0.0.0.0:54115 *:*
UDP 0.0.0.0:54116 *:*
UDP 0.0.0.0:54117 *:*
UDP 0.0.0.0:54118 *:*
UDP 0.0.0.0:54119 *:*
UDP 0.0.0.0:54120 *:*
UDP 0.0.0.0:54121 *:*
UDP 0.0.0.0:54122 *:*
UDP 0.0.0.0:54123 *:*
UDP 0.0.0.0:54124 *:*
UDP 0.0.0.0:54125 *:*
UDP 0.0.0.0:54126 *:*
UDP 0.0.0.0:54127 *:*
UDP 0.0.0.0:54128 *:*
UDP 0.0.0.0:54129 *:*
UDP 0.0.0.0:54130 *:*
UDP 0.0.0.0:54131 *:*
UDP 0.0.0.0:54132 *:*
UDP 0.0.0.0:54133 *:*
UDP 0.0.0.0:54134 *:*
UDP 0.0.0.0:54135 *:*
UDP 0.0.0.0:54136 *:*
UDP 0.0.0.0:54137 *:*
UDP 0.0.0.0:54138 *:*
UDP 0.0.0.0:54139 *:*
UDP 0.0.0.0:54140 *:*
UDP 0.0.0.0:54141 *:*
UDP 0.0.0.0:54142 *:*
UDP 0.0.0.0:54143 *:*
UDP 0.0.0.0:54144 *:*
UDP 0.0.0.0:54145 *:*
UDP 0.0.0.0:54146 *:*
UDP 0.0.0.0:54147 *:*
UDP 0.0.0.0:54148 *:*
UDP 0.0.0.0:54149 *:*
UDP 0.0.0.0:54150 *:*
UDP 0.0.0.0:54151 *:*
UDP 0.0.0.0:54152 *:*
UDP 0.0.0.0:54153 *:*
UDP 0.0.0.0:54154 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 143/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54155 *:*
UDP 0.0.0.0:54156 *:*
UDP 0.0.0.0:54157 *:*
UDP 0.0.0.0:54158 *:*
UDP 0.0.0.0:54159 *:*
UDP 0.0.0.0:54160 *:*
UDP 0.0.0.0:54161 *:*
UDP 0.0.0.0:54162 *:*
UDP 0.0.0.0:54163 *:*
UDP 0.0.0.0:54164 *:*
UDP 0.0.0.0:54165 *:*
UDP 0.0.0.0:54166 *:*
UDP 0.0.0.0:54167 *:*
UDP 0.0.0.0:54168 *:*
UDP 0.0.0.0:54169 *:*
UDP 0.0.0.0:54171 *:*
UDP 0.0.0.0:54172 *:*
UDP 0.0.0.0:54173 *:*
UDP 0.0.0.0:54174 *:*
UDP 0.0.0.0:54175 *:*
UDP 0.0.0.0:54176 *:*
UDP 0.0.0.0:54177 *:*
UDP 0.0.0.0:54178 *:*
UDP 0.0.0.0:54179 *:*
UDP 0.0.0.0:54180 *:*
UDP 0.0.0.0:54181 *:*
UDP 0.0.0.0:54182 *:*
UDP 0.0.0.0:54183 *:*
UDP 0.0.0.0:54184 *:*
UDP 0.0.0.0:54185 *:*
UDP 0.0.0.0:54186 *:*
UDP 0.0.0.0:54187 *:*
UDP 0.0.0.0:54188 *:*
UDP 0.0.0.0:54189 *:*
UDP 0.0.0.0:54190 *:*
UDP 0.0.0.0:54191 *:*
UDP 0.0.0.0:54192 *:*
UDP 0.0.0.0:54193 *:*
UDP 0.0.0.0:54194 *:*
UDP 0.0.0.0:54195 *:*
UDP 0.0.0.0:54196 *:*
UDP 0.0.0.0:54197 *:*
UDP 0.0.0.0:54198 *:*
UDP 0.0.0.0:54199 *:*
UDP 0.0.0.0:54200 *:*
UDP 0.0.0.0:54201 *:*
UDP 0.0.0.0:54202 *:*
UDP 0.0.0.0:54203 *:*
UDP 0.0.0.0:54204 *:*
UDP 0.0.0.0:54205 *:*
UDP 0.0.0.0:54206 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 144/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54207 *:*
UDP 0.0.0.0:54208 *:*
UDP 0.0.0.0:54209 *:*
UDP 0.0.0.0:54210 *:*
UDP 0.0.0.0:54211 *:*
UDP 0.0.0.0:54212 *:*
UDP 0.0.0.0:54213 *:*
UDP 0.0.0.0:54214 *:*
UDP 0.0.0.0:54215 *:*
UDP 0.0.0.0:54216 *:*
UDP 0.0.0.0:54217 *:*
UDP 0.0.0.0:54218 *:*
UDP 0.0.0.0:54219 *:*
UDP 0.0.0.0:54220 *:*
UDP 0.0.0.0:54221 *:*
UDP 0.0.0.0:54222 *:*
UDP 0.0.0.0:54223 *:*
UDP 0.0.0.0:54224 *:*
UDP 0.0.0.0:54225 *:*
UDP 0.0.0.0:54226 *:*
UDP 0.0.0.0:54227 *:*
UDP 0.0.0.0:54228 *:*
UDP 0.0.0.0:54229 *:*
UDP 0.0.0.0:54230 *:*
UDP 0.0.0.0:54231 *:*
UDP 0.0.0.0:54232 *:*
UDP 0.0.0.0:54233 *:*
UDP 0.0.0.0:54234 *:*
UDP 0.0.0.0:54235 *:*
UDP 0.0.0.0:54236 *:*
UDP 0.0.0.0:54237 *:*
UDP 0.0.0.0:54238 *:*
UDP 0.0.0.0:54239 *:*
UDP 0.0.0.0:54240 *:*
UDP 0.0.0.0:54241 *:*
UDP 0.0.0.0:54242 *:*
UDP 0.0.0.0:54243 *:*
UDP 0.0.0.0:54244 *:*
UDP 0.0.0.0:54245 *:*
UDP 0.0.0.0:54246 *:*
UDP 0.0.0.0:54247 *:*
UDP 0.0.0.0:54248 *:*
UDP 0.0.0.0:54249 *:*
UDP 0.0.0.0:54250 *:*
UDP 0.0.0.0:54251 *:*
UDP 0.0.0.0:54252 *:*
UDP 0.0.0.0:54253 *:*
UDP 0.0.0.0:54254 *:*
UDP 0.0.0.0:54255 *:*
UDP 0.0.0.0:54256 *:*
UDP 0.0.0.0:54257 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 145/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54258 *:*
UDP 0.0.0.0:54259 *:*
UDP 0.0.0.0:54260 *:*
UDP 0.0.0.0:54261 *:*
UDP 0.0.0.0:54262 *:*
UDP 0.0.0.0:54263 *:*
UDP 0.0.0.0:54264 *:*
UDP 0.0.0.0:54265 *:*
UDP 0.0.0.0:54266 *:*
UDP 0.0.0.0:54267 *:*
UDP 0.0.0.0:54268 *:*
UDP 0.0.0.0:54269 *:*
UDP 0.0.0.0:54270 *:*
UDP 0.0.0.0:54271 *:*
UDP 0.0.0.0:54272 *:*
UDP 0.0.0.0:54273 *:*
UDP 0.0.0.0:54274 *:*
UDP 0.0.0.0:54275 *:*
UDP 0.0.0.0:54276 *:*
UDP 0.0.0.0:54277 *:*
UDP 0.0.0.0:54278 *:*
UDP 0.0.0.0:54279 *:*
UDP 0.0.0.0:54280 *:*
UDP 0.0.0.0:54281 *:*
UDP 0.0.0.0:54282 *:*
UDP 0.0.0.0:54283 *:*
UDP 0.0.0.0:54284 *:*
UDP 0.0.0.0:54285 *:*
UDP 0.0.0.0:54286 *:*
UDP 0.0.0.0:54287 *:*
UDP 0.0.0.0:54288 *:*
UDP 0.0.0.0:54289 *:*
UDP 0.0.0.0:54290 *:*
UDP 0.0.0.0:54291 *:*
UDP 0.0.0.0:54292 *:*
UDP 0.0.0.0:54293 *:*
UDP 0.0.0.0:54294 *:*
UDP 0.0.0.0:54295 *:*
UDP 0.0.0.0:54296 *:*
UDP 0.0.0.0:54297 *:*
UDP 0.0.0.0:54298 *:*
UDP 0.0.0.0:54299 *:*
UDP 0.0.0.0:54300 *:*
UDP 0.0.0.0:54301 *:*
UDP 0.0.0.0:54302 *:*
UDP 0.0.0.0:54303 *:*
UDP 0.0.0.0:54304 *:*
UDP 0.0.0.0:54305 *:*
UDP 0.0.0.0:54306 *:*
UDP 0.0.0.0:54307 *:*
UDP 0.0.0.0:54308 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 146/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54309 *:*
UDP 0.0.0.0:54310 *:*
UDP 0.0.0.0:54311 *:*
UDP 0.0.0.0:54312 *:*
UDP 0.0.0.0:54313 *:*
UDP 0.0.0.0:54314 *:*
UDP 0.0.0.0:54315 *:*
UDP 0.0.0.0:54316 *:*
UDP 0.0.0.0:54317 *:*
UDP 0.0.0.0:54318 *:*
UDP 0.0.0.0:54319 *:*
UDP 0.0.0.0:54320 *:*
UDP 0.0.0.0:54321 *:*
UDP 0.0.0.0:54322 *:*
UDP 0.0.0.0:54323 *:*
UDP 0.0.0.0:54324 *:*
UDP 0.0.0.0:54325 *:*
UDP 0.0.0.0:54326 *:*
UDP 0.0.0.0:54327 *:*
UDP 0.0.0.0:54328 *:*
UDP 0.0.0.0:54329 *:*
UDP 0.0.0.0:54330 *:*
UDP 0.0.0.0:54331 *:*
UDP 0.0.0.0:54332 *:*
UDP 0.0.0.0:54333 *:*
UDP 0.0.0.0:54334 *:*
UDP 0.0.0.0:54335 *:*
UDP 0.0.0.0:54336 *:*
UDP 0.0.0.0:54337 *:*
UDP 0.0.0.0:54338 *:*
UDP 0.0.0.0:54339 *:*
UDP 0.0.0.0:54340 *:*
UDP 0.0.0.0:54341 *:*
UDP 0.0.0.0:54342 *:*
UDP 0.0.0.0:54343 *:*
UDP 0.0.0.0:54344 *:*
UDP 0.0.0.0:54345 *:*
UDP 0.0.0.0:54346 *:*
UDP 0.0.0.0:54347 *:*
UDP 0.0.0.0:54348 *:*
UDP 0.0.0.0:54349 *:*
UDP 0.0.0.0:54350 *:*
UDP 0.0.0.0:54351 *:*
UDP 0.0.0.0:54352 *:*
UDP 0.0.0.0:54353 *:*
UDP 0.0.0.0:54354 *:*
UDP 0.0.0.0:54355 *:*
UDP 0.0.0.0:54356 *:*
UDP 0.0.0.0:54357 *:*
UDP 0.0.0.0:54358 *:*
UDP 0.0.0.0:54359 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 147/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54360 *:*
UDP 0.0.0.0:54361 *:*
UDP 0.0.0.0:54362 *:*
UDP 0.0.0.0:54363 *:*
UDP 0.0.0.0:54364 *:*
UDP 0.0.0.0:54365 *:*
UDP 0.0.0.0:54366 *:*
UDP 0.0.0.0:54367 *:*
UDP 0.0.0.0:54368 *:*
UDP 0.0.0.0:54369 *:*
UDP 0.0.0.0:54370 *:*
UDP 0.0.0.0:54371 *:*
UDP 0.0.0.0:54372 *:*
UDP 0.0.0.0:54373 *:*
UDP 0.0.0.0:54374 *:*
UDP 0.0.0.0:54375 *:*
UDP 0.0.0.0:54376 *:*
UDP 0.0.0.0:54377 *:*
UDP 0.0.0.0:54378 *:*
UDP 0.0.0.0:54379 *:*
UDP 0.0.0.0:54380 *:*
UDP 0.0.0.0:54381 *:*
UDP 0.0.0.0:54382 *:*
UDP 0.0.0.0:54383 *:*
UDP 0.0.0.0:54384 *:*
UDP 0.0.0.0:54385 *:*
UDP 0.0.0.0:54386 *:*
UDP 0.0.0.0:54387 *:*
UDP 0.0.0.0:54388 *:*
UDP 0.0.0.0:54389 *:*
UDP 0.0.0.0:54390 *:*
UDP 0.0.0.0:54391 *:*
UDP 0.0.0.0:54392 *:*
UDP 0.0.0.0:54393 *:*
UDP 0.0.0.0:54394 *:*
UDP 0.0.0.0:54395 *:*
UDP 0.0.0.0:54396 *:*
UDP 0.0.0.0:54397 *:*
UDP 0.0.0.0:54398 *:*
UDP 0.0.0.0:54399 *:*
UDP 0.0.0.0:54400 *:*
UDP 0.0.0.0:54401 *:*
UDP 0.0.0.0:54402 *:*
UDP 0.0.0.0:54403 *:*
UDP 0.0.0.0:54404 *:*
UDP 0.0.0.0:54405 *:*
UDP 0.0.0.0:54406 *:*
UDP 0.0.0.0:54407 *:*
UDP 0.0.0.0:54408 *:*
UDP 0.0.0.0:54409 *:*
UDP 0.0.0.0:54410 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 148/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54411 *:*
UDP 0.0.0.0:54412 *:*
UDP 0.0.0.0:54413 *:*
UDP 0.0.0.0:54414 *:*
UDP 0.0.0.0:54415 *:*
UDP 0.0.0.0:54416 *:*
UDP 0.0.0.0:54417 *:*
UDP 0.0.0.0:54418 *:*
UDP 0.0.0.0:54419 *:*
UDP 0.0.0.0:54420 *:*
UDP 0.0.0.0:54421 *:*
UDP 0.0.0.0:54422 *:*
UDP 0.0.0.0:54423 *:*
UDP 0.0.0.0:54424 *:*
UDP 0.0.0.0:54425 *:*
UDP 0.0.0.0:54426 *:*
UDP 0.0.0.0:54427 *:*
UDP 0.0.0.0:54428 *:*
UDP 0.0.0.0:54429 *:*
UDP 0.0.0.0:54430 *:*
UDP 0.0.0.0:54431 *:*
UDP 0.0.0.0:54432 *:*
UDP 0.0.0.0:54433 *:*
UDP 0.0.0.0:54434 *:*
UDP 0.0.0.0:54435 *:*
UDP 0.0.0.0:54436 *:*
UDP 0.0.0.0:54437 *:*
UDP 0.0.0.0:54438 *:*
UDP 0.0.0.0:54439 *:*
UDP 0.0.0.0:54440 *:*
UDP 0.0.0.0:54441 *:*
UDP 0.0.0.0:54442 *:*
UDP 0.0.0.0:54443 *:*
UDP 0.0.0.0:54444 *:*
UDP 0.0.0.0:54445 *:*
UDP 0.0.0.0:54446 *:*
UDP 0.0.0.0:54447 *:*
UDP 0.0.0.0:54448 *:*
UDP 0.0.0.0:54449 *:*
UDP 0.0.0.0:54450 *:*
UDP 0.0.0.0:54451 *:*
UDP 0.0.0.0:54452 *:*
UDP 0.0.0.0:54453 *:*
UDP 0.0.0.0:54454 *:*
UDP 0.0.0.0:54455 *:*
UDP 0.0.0.0:54456 *:*
UDP 0.0.0.0:54457 *:*
UDP 0.0.0.0:54458 *:*
UDP 0.0.0.0:54459 *:*
UDP 0.0.0.0:54460 *:*
UDP 0.0.0.0:54461 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 149/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54462 *:*
UDP 0.0.0.0:54463 *:*
UDP 0.0.0.0:54464 *:*
UDP 0.0.0.0:54465 *:*
UDP 0.0.0.0:54466 *:*
UDP 0.0.0.0:54467 *:*
UDP 0.0.0.0:54468 *:*
UDP 0.0.0.0:54469 *:*
UDP 0.0.0.0:54470 *:*
UDP 0.0.0.0:54471 *:*
UDP 0.0.0.0:54472 *:*
UDP 0.0.0.0:54473 *:*
UDP 0.0.0.0:54474 *:*
UDP 0.0.0.0:54475 *:*
UDP 0.0.0.0:54476 *:*
UDP 0.0.0.0:54477 *:*
UDP 0.0.0.0:54478 *:*
UDP 0.0.0.0:54479 *:*
UDP 0.0.0.0:54480 *:*
UDP 0.0.0.0:54481 *:*
UDP 0.0.0.0:54482 *:*
UDP 0.0.0.0:54483 *:*
UDP 0.0.0.0:54484 *:*
UDP 0.0.0.0:54485 *:*
UDP 0.0.0.0:54486 *:*
UDP 0.0.0.0:54487 *:*
UDP 0.0.0.0:54488 *:*
UDP 0.0.0.0:54489 *:*
UDP 0.0.0.0:54490 *:*
UDP 0.0.0.0:54491 *:*
UDP 0.0.0.0:54492 *:*
UDP 0.0.0.0:54493 *:*
UDP 0.0.0.0:54494 *:*
UDP 0.0.0.0:54495 *:*
UDP 0.0.0.0:54496 *:*
UDP 0.0.0.0:54497 *:*
UDP 0.0.0.0:54498 *:*
UDP 0.0.0.0:54499 *:*
UDP 0.0.0.0:54500 *:*
UDP 0.0.0.0:54501 *:*
UDP 0.0.0.0:54502 *:*
UDP 0.0.0.0:54503 *:*
UDP 0.0.0.0:54504 *:*
UDP 0.0.0.0:54505 *:*
UDP 0.0.0.0:54506 *:*
UDP 0.0.0.0:54507 *:*
UDP 0.0.0.0:54508 *:*
UDP 0.0.0.0:54509 *:*
UDP 0.0.0.0:54510 *:*
UDP 0.0.0.0:54511 *:*
UDP 0.0.0.0:54512 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 150/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54513 *:*
UDP 0.0.0.0:54514 *:*
UDP 0.0.0.0:54515 *:*
UDP 0.0.0.0:54516 *:*
UDP 0.0.0.0:54517 *:*
UDP 0.0.0.0:54518 *:*
UDP 0.0.0.0:54519 *:*
UDP 0.0.0.0:54520 *:*
UDP 0.0.0.0:54521 *:*
UDP 0.0.0.0:54522 *:*
UDP 0.0.0.0:54523 *:*
UDP 0.0.0.0:54524 *:*
UDP 0.0.0.0:54525 *:*
UDP 0.0.0.0:54526 *:*
UDP 0.0.0.0:54527 *:*
UDP 0.0.0.0:54528 *:*
UDP 0.0.0.0:54529 *:*
UDP 0.0.0.0:54530 *:*
UDP 0.0.0.0:54531 *:*
UDP 0.0.0.0:54532 *:*
UDP 0.0.0.0:54533 *:*
UDP 0.0.0.0:54534 *:*
UDP 0.0.0.0:54535 *:*
UDP 0.0.0.0:54536 *:*
UDP 0.0.0.0:54537 *:*
UDP 0.0.0.0:54538 *:*
UDP 0.0.0.0:54539 *:*
UDP 0.0.0.0:54540 *:*
UDP 0.0.0.0:54541 *:*
UDP 0.0.0.0:54542 *:*
UDP 0.0.0.0:54543 *:*
UDP 0.0.0.0:54544 *:*
UDP 0.0.0.0:54545 *:*
UDP 0.0.0.0:54546 *:*
UDP 0.0.0.0:54547 *:*
UDP 0.0.0.0:54548 *:*
UDP 0.0.0.0:54549 *:*
UDP 0.0.0.0:54550 *:*
UDP 0.0.0.0:54551 *:*
UDP 0.0.0.0:54552 *:*
UDP 0.0.0.0:54553 *:*
UDP 0.0.0.0:54554 *:*
UDP 0.0.0.0:54555 *:*
UDP 0.0.0.0:54556 *:*
UDP 0.0.0.0:54557 *:*
UDP 0.0.0.0:54558 *:*
UDP 0.0.0.0:54559 *:*
UDP 0.0.0.0:54560 *:*
UDP 0.0.0.0:54561 *:*
UDP 0.0.0.0:54562 *:*
UDP 0.0.0.0:54563 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 151/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54564 *:*
UDP 0.0.0.0:54565 *:*
UDP 0.0.0.0:54566 *:*
UDP 0.0.0.0:54567 *:*
UDP 0.0.0.0:54568 *:*
UDP 0.0.0.0:54569 *:*
UDP 0.0.0.0:54570 *:*
UDP 0.0.0.0:54571 *:*
UDP 0.0.0.0:54572 *:*
UDP 0.0.0.0:54573 *:*
UDP 0.0.0.0:54574 *:*
UDP 0.0.0.0:54575 *:*
UDP 0.0.0.0:54576 *:*
UDP 0.0.0.0:54577 *:*
UDP 0.0.0.0:54578 *:*
UDP 0.0.0.0:54579 *:*
UDP 0.0.0.0:54580 *:*
UDP 0.0.0.0:54581 *:*
UDP 0.0.0.0:54582 *:*
UDP 0.0.0.0:54583 *:*
UDP 0.0.0.0:54584 *:*
UDP 0.0.0.0:54585 *:*
UDP 0.0.0.0:54586 *:*
UDP 0.0.0.0:54587 *:*
UDP 0.0.0.0:54588 *:*
UDP 0.0.0.0:54589 *:*
UDP 0.0.0.0:54590 *:*
UDP 0.0.0.0:54591 *:*
UDP 0.0.0.0:54592 *:*
UDP 0.0.0.0:54593 *:*
UDP 0.0.0.0:54594 *:*
UDP 0.0.0.0:54595 *:*
UDP 0.0.0.0:54596 *:*
UDP 0.0.0.0:54597 *:*
UDP 0.0.0.0:54598 *:*
UDP 0.0.0.0:54599 *:*
UDP 0.0.0.0:54600 *:*
UDP 0.0.0.0:54601 *:*
UDP 0.0.0.0:54602 *:*
UDP 0.0.0.0:54603 *:*
UDP 0.0.0.0:54604 *:*
UDP 0.0.0.0:54605 *:*
UDP 0.0.0.0:54606 *:*
UDP 0.0.0.0:54607 *:*
UDP 0.0.0.0:54608 *:*
UDP 0.0.0.0:54609 *:*
UDP 0.0.0.0:54610 *:*
UDP 0.0.0.0:54611 *:*
UDP 0.0.0.0:54612 *:*
UDP 0.0.0.0:54613 *:*
UDP 0.0.0.0:54614 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 152/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54615 *:*
UDP 0.0.0.0:54616 *:*
UDP 0.0.0.0:54617 *:*
UDP 0.0.0.0:54618 *:*
UDP 0.0.0.0:54619 *:*
UDP 0.0.0.0:54620 *:*
UDP 0.0.0.0:54621 *:*
UDP 0.0.0.0:54622 *:*
UDP 0.0.0.0:54623 *:*
UDP 0.0.0.0:54624 *:*
UDP 0.0.0.0:54625 *:*
UDP 0.0.0.0:54626 *:*
UDP 0.0.0.0:54627 *:*
UDP 0.0.0.0:54628 *:*
UDP 0.0.0.0:54629 *:*
UDP 0.0.0.0:54630 *:*
UDP 0.0.0.0:54631 *:*
UDP 0.0.0.0:54632 *:*
UDP 0.0.0.0:54633 *:*
UDP 0.0.0.0:54634 *:*
UDP 0.0.0.0:54635 *:*
UDP 0.0.0.0:54636 *:*
UDP 0.0.0.0:54637 *:*
UDP 0.0.0.0:54638 *:*
UDP 0.0.0.0:54639 *:*
UDP 0.0.0.0:54640 *:*
UDP 0.0.0.0:54641 *:*
UDP 0.0.0.0:54642 *:*
UDP 0.0.0.0:54643 *:*
UDP 0.0.0.0:54644 *:*
UDP 0.0.0.0:54645 *:*
UDP 0.0.0.0:54646 *:*
UDP 0.0.0.0:54647 *:*
UDP 0.0.0.0:54648 *:*
UDP 0.0.0.0:54649 *:*
UDP 0.0.0.0:54650 *:*
UDP 0.0.0.0:54651 *:*
UDP 0.0.0.0:54652 *:*
UDP 0.0.0.0:54653 *:*
UDP 0.0.0.0:54654 *:*
UDP 0.0.0.0:54655 *:*
UDP 0.0.0.0:54656 *:*
UDP 0.0.0.0:54657 *:*
UDP 0.0.0.0:54658 *:*
UDP 0.0.0.0:54659 *:*
UDP 0.0.0.0:54660 *:*
UDP 0.0.0.0:54661 *:*
UDP 0.0.0.0:54662 *:*
UDP 0.0.0.0:54663 *:*
UDP 0.0.0.0:54664 *:*
UDP 0.0.0.0:54665 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 153/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54666 *:*
UDP 0.0.0.0:54667 *:*
UDP 0.0.0.0:54668 *:*
UDP 0.0.0.0:54669 *:*
UDP 0.0.0.0:54670 *:*
UDP 0.0.0.0:54671 *:*
UDP 0.0.0.0:54672 *:*
UDP 0.0.0.0:54673 *:*
UDP 0.0.0.0:54674 *:*
UDP 0.0.0.0:54675 *:*
UDP 0.0.0.0:54676 *:*
UDP 0.0.0.0:54677 *:*
UDP 0.0.0.0:54678 *:*
UDP 0.0.0.0:54679 *:*
UDP 0.0.0.0:54680 *:*
UDP 0.0.0.0:54681 *:*
UDP 0.0.0.0:54682 *:*
UDP 0.0.0.0:54683 *:*
UDP 0.0.0.0:54684 *:*
UDP 0.0.0.0:54685 *:*
UDP 0.0.0.0:54686 *:*
UDP 0.0.0.0:54687 *:*
UDP 0.0.0.0:54688 *:*
UDP 0.0.0.0:54689 *:*
UDP 0.0.0.0:54690 *:*
UDP 0.0.0.0:54691 *:*
UDP 0.0.0.0:54692 *:*
UDP 0.0.0.0:54693 *:*
UDP 0.0.0.0:54694 *:*
UDP 0.0.0.0:54695 *:*
UDP 0.0.0.0:54696 *:*
UDP 0.0.0.0:54697 *:*
UDP 0.0.0.0:54698 *:*
UDP 0.0.0.0:54699 *:*
UDP 0.0.0.0:54700 *:*
UDP 0.0.0.0:54701 *:*
UDP 0.0.0.0:54702 *:*
UDP 0.0.0.0:54703 *:*
UDP 0.0.0.0:54704 *:*
UDP 0.0.0.0:54705 *:*
UDP 0.0.0.0:54706 *:*
UDP 0.0.0.0:54707 *:*
UDP 0.0.0.0:54708 *:*
UDP 0.0.0.0:54709 *:*
UDP 0.0.0.0:54710 *:*
UDP 0.0.0.0:54711 *:*
UDP 0.0.0.0:54712 *:*
UDP 0.0.0.0:54713 *:*
UDP 0.0.0.0:54714 *:*
UDP 0.0.0.0:54715 *:*
UDP 0.0.0.0:54716 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 154/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54717 *:*
UDP 0.0.0.0:54718 *:*
UDP 0.0.0.0:54719 *:*
UDP 0.0.0.0:54720 *:*
UDP 0.0.0.0:54721 *:*
UDP 0.0.0.0:54722 *:*
UDP 0.0.0.0:54723 *:*
UDP 0.0.0.0:54724 *:*
UDP 0.0.0.0:54725 *:*
UDP 0.0.0.0:54726 *:*
UDP 0.0.0.0:54727 *:*
UDP 0.0.0.0:54728 *:*
UDP 0.0.0.0:54729 *:*
UDP 0.0.0.0:54730 *:*
UDP 0.0.0.0:54731 *:*
UDP 0.0.0.0:54732 *:*
UDP 0.0.0.0:54733 *:*
UDP 0.0.0.0:54734 *:*
UDP 0.0.0.0:54735 *:*
UDP 0.0.0.0:54736 *:*
UDP 0.0.0.0:54737 *:*
UDP 0.0.0.0:54738 *:*
UDP 0.0.0.0:54739 *:*
UDP 0.0.0.0:54740 *:*
UDP 0.0.0.0:54741 *:*
UDP 0.0.0.0:54742 *:*
UDP 0.0.0.0:54743 *:*
UDP 0.0.0.0:54744 *:*
UDP 0.0.0.0:54745 *:*
UDP 0.0.0.0:54746 *:*
UDP 0.0.0.0:54747 *:*
UDP 0.0.0.0:54748 *:*
UDP 0.0.0.0:54749 *:*
UDP 0.0.0.0:54750 *:*
UDP 0.0.0.0:54751 *:*
UDP 0.0.0.0:54752 *:*
UDP 0.0.0.0:54753 *:*
UDP 0.0.0.0:54754 *:*
UDP 0.0.0.0:54755 *:*
UDP 0.0.0.0:54756 *:*
UDP 0.0.0.0:54757 *:*
UDP 0.0.0.0:54758 *:*
UDP 0.0.0.0:54759 *:*
UDP 0.0.0.0:54760 *:*
UDP 0.0.0.0:54761 *:*
UDP 0.0.0.0:54762 *:*
UDP 0.0.0.0:54763 *:*
UDP 0.0.0.0:54764 *:*
UDP 0.0.0.0:54765 *:*
UDP 0.0.0.0:54766 *:*
UDP 0.0.0.0:54767 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 155/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54768 *:*
UDP 0.0.0.0:54769 *:*
UDP 0.0.0.0:54770 *:*
UDP 0.0.0.0:54771 *:*
UDP 0.0.0.0:54772 *:*
UDP 0.0.0.0:54773 *:*
UDP 0.0.0.0:54774 *:*
UDP 0.0.0.0:54775 *:*
UDP 0.0.0.0:54776 *:*
UDP 0.0.0.0:54777 *:*
UDP 0.0.0.0:54778 *:*
UDP 0.0.0.0:54779 *:*
UDP 0.0.0.0:54780 *:*
UDP 0.0.0.0:54781 *:*
UDP 0.0.0.0:54782 *:*
UDP 0.0.0.0:54783 *:*
UDP 0.0.0.0:54784 *:*
UDP 0.0.0.0:54785 *:*
UDP 0.0.0.0:54786 *:*
UDP 0.0.0.0:54787 *:*
UDP 0.0.0.0:54788 *:*
UDP 0.0.0.0:54789 *:*
UDP 0.0.0.0:54790 *:*
UDP 0.0.0.0:54791 *:*
UDP 0.0.0.0:54792 *:*
UDP 0.0.0.0:54793 *:*
UDP 0.0.0.0:54794 *:*
UDP 0.0.0.0:54795 *:*
UDP 0.0.0.0:54796 *:*
UDP 0.0.0.0:54797 *:*
UDP 0.0.0.0:54798 *:*
UDP 0.0.0.0:54799 *:*
UDP 0.0.0.0:54800 *:*
UDP 0.0.0.0:54801 *:*
UDP 0.0.0.0:54802 *:*
UDP 0.0.0.0:54803 *:*
UDP 0.0.0.0:54804 *:*
UDP 0.0.0.0:54805 *:*
UDP 0.0.0.0:54806 *:*
UDP 0.0.0.0:54807 *:*
UDP 0.0.0.0:54808 *:*
UDP 0.0.0.0:54809 *:*
UDP 0.0.0.0:54810 *:*
UDP 0.0.0.0:54811 *:*
UDP 0.0.0.0:54812 *:*
UDP 0.0.0.0:54813 *:*
UDP 0.0.0.0:54814 *:*
UDP 0.0.0.0:54815 *:*
UDP 0.0.0.0:54816 *:*
UDP 0.0.0.0:54817 *:*
UDP 0.0.0.0:54818 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 156/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54819 *:*
UDP 0.0.0.0:54820 *:*
UDP 0.0.0.0:54821 *:*
UDP 0.0.0.0:54822 *:*
UDP 0.0.0.0:54823 *:*
UDP 0.0.0.0:54824 *:*
UDP 0.0.0.0:54825 *:*
UDP 0.0.0.0:54826 *:*
UDP 0.0.0.0:54827 *:*
UDP 0.0.0.0:54828 *:*
UDP 0.0.0.0:54829 *:*
UDP 0.0.0.0:54830 *:*
UDP 0.0.0.0:54831 *:*
UDP 0.0.0.0:54832 *:*
UDP 0.0.0.0:54833 *:*
UDP 0.0.0.0:54834 *:*
UDP 0.0.0.0:54835 *:*
UDP 0.0.0.0:54836 *:*
UDP 0.0.0.0:54837 *:*
UDP 0.0.0.0:54838 *:*
UDP 0.0.0.0:54839 *:*
UDP 0.0.0.0:54840 *:*
UDP 0.0.0.0:54841 *:*
UDP 0.0.0.0:54842 *:*
UDP 0.0.0.0:54843 *:*
UDP 0.0.0.0:54844 *:*
UDP 0.0.0.0:54845 *:*
UDP 0.0.0.0:54846 *:*
UDP 0.0.0.0:54847 *:*
UDP 0.0.0.0:54848 *:*
UDP 0.0.0.0:54849 *:*
UDP 0.0.0.0:54850 *:*
UDP 0.0.0.0:54851 *:*
UDP 0.0.0.0:54852 *:*
UDP 0.0.0.0:54853 *:*
UDP 0.0.0.0:54854 *:*
UDP 0.0.0.0:54855 *:*
UDP 0.0.0.0:54856 *:*
UDP 0.0.0.0:54857 *:*
UDP 0.0.0.0:54858 *:*
UDP 0.0.0.0:54859 *:*
UDP 0.0.0.0:54860 *:*
UDP 0.0.0.0:54861 *:*
UDP 0.0.0.0:54862 *:*
UDP 0.0.0.0:54863 *:*
UDP 0.0.0.0:54864 *:*
UDP 0.0.0.0:54865 *:*
UDP 0.0.0.0:54866 *:*
UDP 0.0.0.0:54867 *:*
UDP 0.0.0.0:54868 *:*
UDP 0.0.0.0:54869 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 157/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54870 *:*
UDP 0.0.0.0:54871 *:*
UDP 0.0.0.0:54872 *:*
UDP 0.0.0.0:54873 *:*
UDP 0.0.0.0:54874 *:*
UDP 0.0.0.0:54875 *:*
UDP 0.0.0.0:54876 *:*
UDP 0.0.0.0:54877 *:*
UDP 0.0.0.0:54878 *:*
UDP 0.0.0.0:54879 *:*
UDP 0.0.0.0:54880 *:*
UDP 0.0.0.0:54881 *:*
UDP 0.0.0.0:54882 *:*
UDP 0.0.0.0:54883 *:*
UDP 0.0.0.0:54884 *:*
UDP 0.0.0.0:54885 *:*
UDP 0.0.0.0:54886 *:*
UDP 0.0.0.0:54887 *:*
UDP 0.0.0.0:54888 *:*
UDP 0.0.0.0:54889 *:*
UDP 0.0.0.0:54890 *:*
UDP 0.0.0.0:54891 *:*
UDP 0.0.0.0:54892 *:*
UDP 0.0.0.0:54893 *:*
UDP 0.0.0.0:54894 *:*
UDP 0.0.0.0:54895 *:*
UDP 0.0.0.0:54896 *:*
UDP 0.0.0.0:54897 *:*
UDP 0.0.0.0:54898 *:*
UDP 0.0.0.0:54899 *:*
UDP 0.0.0.0:54900 *:*
UDP 0.0.0.0:54901 *:*
UDP 0.0.0.0:54902 *:*
UDP 0.0.0.0:54903 *:*
UDP 0.0.0.0:54904 *:*
UDP 0.0.0.0:54905 *:*
UDP 0.0.0.0:54906 *:*
UDP 0.0.0.0:54907 *:*
UDP 0.0.0.0:54908 *:*
UDP 0.0.0.0:54909 *:*
UDP 0.0.0.0:54910 *:*
UDP 0.0.0.0:54911 *:*
UDP 0.0.0.0:54912 *:*
UDP 0.0.0.0:54913 *:*
UDP 0.0.0.0:54914 *:*
UDP 0.0.0.0:54915 *:*
UDP 0.0.0.0:54916 *:*
UDP 0.0.0.0:54917 *:*
UDP 0.0.0.0:54918 *:*
UDP 0.0.0.0:54919 *:*
UDP 0.0.0.0:54920 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 158/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54921 *:*
UDP 0.0.0.0:54922 *:*
UDP 0.0.0.0:54923 *:*
UDP 0.0.0.0:54924 *:*
UDP 0.0.0.0:54925 *:*
UDP 0.0.0.0:54926 *:*
UDP 0.0.0.0:54927 *:*
UDP 0.0.0.0:54928 *:*
UDP 0.0.0.0:54929 *:*
UDP 0.0.0.0:54930 *:*
UDP 0.0.0.0:54931 *:*
UDP 0.0.0.0:54932 *:*
UDP 0.0.0.0:54933 *:*
UDP 0.0.0.0:54934 *:*
UDP 0.0.0.0:54935 *:*
UDP 0.0.0.0:54936 *:*
UDP 0.0.0.0:54937 *:*
UDP 0.0.0.0:54938 *:*
UDP 0.0.0.0:54939 *:*
UDP 0.0.0.0:54940 *:*
UDP 0.0.0.0:54941 *:*
UDP 0.0.0.0:54942 *:*
UDP 0.0.0.0:54943 *:*
UDP 0.0.0.0:54944 *:*
UDP 0.0.0.0:54945 *:*
UDP 0.0.0.0:54946 *:*
UDP 0.0.0.0:54947 *:*
UDP 0.0.0.0:54948 *:*
UDP 0.0.0.0:54949 *:*
UDP 0.0.0.0:54950 *:*
UDP 0.0.0.0:54951 *:*
UDP 0.0.0.0:54952 *:*
UDP 0.0.0.0:54953 *:*
UDP 0.0.0.0:54954 *:*
UDP 0.0.0.0:54955 *:*
UDP 0.0.0.0:54956 *:*
UDP 0.0.0.0:54957 *:*
UDP 0.0.0.0:54958 *:*
UDP 0.0.0.0:54959 *:*
UDP 0.0.0.0:54960 *:*
UDP 0.0.0.0:54961 *:*
UDP 0.0.0.0:54962 *:*
UDP 0.0.0.0:54963 *:*
UDP 0.0.0.0:54964 *:*
UDP 0.0.0.0:54965 *:*
UDP 0.0.0.0:54966 *:*
UDP 0.0.0.0:54967 *:*
UDP 0.0.0.0:54968 *:*
UDP 0.0.0.0:54969 *:*
UDP 0.0.0.0:54970 *:*
UDP 0.0.0.0:54971 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 159/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54972 *:*
UDP 0.0.0.0:54973 *:*
UDP 0.0.0.0:54974 *:*
UDP 0.0.0.0:54975 *:*
UDP 0.0.0.0:54976 *:*
UDP 0.0.0.0:54977 *:*
UDP 0.0.0.0:54978 *:*
UDP 0.0.0.0:54979 *:*
UDP 0.0.0.0:54980 *:*
UDP 0.0.0.0:54981 *:*
UDP 0.0.0.0:54982 *:*
UDP 0.0.0.0:54983 *:*
UDP 0.0.0.0:54984 *:*
UDP 0.0.0.0:54985 *:*
UDP 0.0.0.0:54986 *:*
UDP 0.0.0.0:54987 *:*
UDP 0.0.0.0:54988 *:*
UDP 0.0.0.0:54989 *:*
UDP 0.0.0.0:54990 *:*
UDP 0.0.0.0:54991 *:*
UDP 0.0.0.0:54992 *:*
UDP 0.0.0.0:54993 *:*
UDP 0.0.0.0:54994 *:*
UDP 0.0.0.0:54995 *:*
UDP 0.0.0.0:54996 *:*
UDP 0.0.0.0:54997 *:*
UDP 0.0.0.0:54998 *:*
UDP 0.0.0.0:54999 *:*
UDP 0.0.0.0:55000 *:*
UDP 0.0.0.0:55001 *:*
UDP 0.0.0.0:55002 *:*
UDP 0.0.0.0:55003 *:*
UDP 0.0.0.0:55004 *:*
UDP 0.0.0.0:55005 *:*
UDP 0.0.0.0:55006 *:*
UDP 0.0.0.0:55007 *:*
UDP 0.0.0.0:55008 *:*
UDP 0.0.0.0:55009 *:*
UDP 0.0.0.0:55010 *:*
UDP 0.0.0.0:55011 *:*
UDP 0.0.0.0:55012 *:*
UDP 0.0.0.0:55013 *:*
UDP 0.0.0.0:55014 *:*
UDP 0.0.0.0:55015 *:*
UDP 0.0.0.0:55016 *:*
UDP 0.0.0.0:55017 *:*
UDP 0.0.0.0:55018 *:*
UDP 0.0.0.0:55019 *:*
UDP 0.0.0.0:55020 *:*
UDP 0.0.0.0:55021 *:*
UDP 0.0.0.0:55022 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 160/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55023 *:*
UDP 0.0.0.0:55024 *:*
UDP 0.0.0.0:55025 *:*
UDP 0.0.0.0:55026 *:*
UDP 0.0.0.0:55027 *:*
UDP 0.0.0.0:55028 *:*
UDP 0.0.0.0:55029 *:*
UDP 0.0.0.0:55030 *:*
UDP 0.0.0.0:55031 *:*
UDP 0.0.0.0:55032 *:*
UDP 0.0.0.0:55033 *:*
UDP 0.0.0.0:55034 *:*
UDP 0.0.0.0:55035 *:*
UDP 0.0.0.0:55036 *:*
UDP 0.0.0.0:55037 *:*
UDP 0.0.0.0:55038 *:*
UDP 0.0.0.0:55039 *:*
UDP 0.0.0.0:55040 *:*
UDP 0.0.0.0:55041 *:*
UDP 0.0.0.0:55042 *:*
UDP 0.0.0.0:55043 *:*
UDP 0.0.0.0:55044 *:*
UDP 0.0.0.0:55045 *:*
UDP 0.0.0.0:55046 *:*
UDP 0.0.0.0:55047 *:*
UDP 0.0.0.0:55048 *:*
UDP 0.0.0.0:55049 *:*
UDP 0.0.0.0:55050 *:*
UDP 0.0.0.0:55051 *:*
UDP 0.0.0.0:55052 *:*
UDP 0.0.0.0:55053 *:*
UDP 0.0.0.0:55054 *:*
UDP 0.0.0.0:55055 *:*
UDP 0.0.0.0:55056 *:*
UDP 0.0.0.0:55057 *:*
UDP 0.0.0.0:55058 *:*
UDP 0.0.0.0:55059 *:*
UDP 0.0.0.0:55060 *:*
UDP 0.0.0.0:55061 *:*
UDP 0.0.0.0:55062 *:*
UDP 0.0.0.0:55063 *:*
UDP 0.0.0.0:55064 *:*
UDP 0.0.0.0:55065 *:*
UDP 0.0.0.0:55066 *:*
UDP 0.0.0.0:55067 *:*
UDP 0.0.0.0:55068 *:*
UDP 0.0.0.0:55069 *:*
UDP 0.0.0.0:55070 *:*
UDP 0.0.0.0:55071 *:*
UDP 0.0.0.0:55072 *:*
UDP 0.0.0.0:55073 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 161/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55074 *:*
UDP 0.0.0.0:55075 *:*
UDP 0.0.0.0:55076 *:*
UDP 0.0.0.0:55077 *:*
UDP 0.0.0.0:55078 *:*
UDP 0.0.0.0:55079 *:*
UDP 0.0.0.0:55080 *:*
UDP 0.0.0.0:55081 *:*
UDP 0.0.0.0:55082 *:*
UDP 0.0.0.0:55083 *:*
UDP 0.0.0.0:55084 *:*
UDP 0.0.0.0:55085 *:*
UDP 0.0.0.0:55086 *:*
UDP 0.0.0.0:55087 *:*
UDP 0.0.0.0:55088 *:*
UDP 0.0.0.0:55089 *:*
UDP 0.0.0.0:55090 *:*
UDP 0.0.0.0:55091 *:*
UDP 0.0.0.0:55092 *:*
UDP 0.0.0.0:55093 *:*
UDP 0.0.0.0:55094 *:*
UDP 0.0.0.0:55095 *:*
UDP 0.0.0.0:55096 *:*
UDP 0.0.0.0:55097 *:*
UDP 0.0.0.0:55098 *:*
UDP 0.0.0.0:55099 *:*
UDP 0.0.0.0:55100 *:*
UDP 0.0.0.0:55101 *:*
UDP 0.0.0.0:55102 *:*
UDP 0.0.0.0:55103 *:*
UDP 0.0.0.0:55104 *:*
UDP 0.0.0.0:55105 *:*
UDP 0.0.0.0:55106 *:*
UDP 0.0.0.0:55107 *:*
UDP 0.0.0.0:55108 *:*
UDP 0.0.0.0:55109 *:*
UDP 0.0.0.0:55110 *:*
UDP 0.0.0.0:55111 *:*
UDP 0.0.0.0:55112 *:*
UDP 0.0.0.0:55113 *:*
UDP 0.0.0.0:55114 *:*
UDP 0.0.0.0:55115 *:*
UDP 0.0.0.0:55116 *:*
UDP 0.0.0.0:55117 *:*
UDP 0.0.0.0:55118 *:*
UDP 0.0.0.0:55119 *:*
UDP 0.0.0.0:55120 *:*
UDP 0.0.0.0:55121 *:*
UDP 0.0.0.0:55122 *:*
UDP 0.0.0.0:55123 *:*
UDP 0.0.0.0:55124 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 162/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55125 *:*
UDP 0.0.0.0:55126 *:*
UDP 0.0.0.0:55127 *:*
UDP 0.0.0.0:55128 *:*
UDP 0.0.0.0:55129 *:*
UDP 0.0.0.0:55130 *:*
UDP 0.0.0.0:55131 *:*
UDP 0.0.0.0:55132 *:*
UDP 0.0.0.0:55133 *:*
UDP 0.0.0.0:55134 *:*
UDP 0.0.0.0:55135 *:*
UDP 0.0.0.0:55136 *:*
UDP 0.0.0.0:55137 *:*
UDP 0.0.0.0:55138 *:*
UDP 0.0.0.0:55139 *:*
UDP 0.0.0.0:55140 *:*
UDP 0.0.0.0:55141 *:*
UDP 0.0.0.0:55142 *:*
UDP 0.0.0.0:55143 *:*
UDP 0.0.0.0:55144 *:*
UDP 0.0.0.0:55145 *:*
UDP 0.0.0.0:55146 *:*
UDP 0.0.0.0:55147 *:*
UDP 0.0.0.0:55148 *:*
UDP 0.0.0.0:55149 *:*
UDP 0.0.0.0:55150 *:*
UDP 0.0.0.0:55151 *:*
UDP 0.0.0.0:55152 *:*
UDP 0.0.0.0:55153 *:*
UDP 0.0.0.0:55154 *:*
UDP 0.0.0.0:55155 *:*
UDP 0.0.0.0:55156 *:*
UDP 0.0.0.0:55157 *:*
UDP 0.0.0.0:55158 *:*
UDP 0.0.0.0:55159 *:*
UDP 0.0.0.0:55160 *:*
UDP 0.0.0.0:55161 *:*
UDP 0.0.0.0:55162 *:*
UDP 0.0.0.0:55163 *:*
UDP 0.0.0.0:55164 *:*
UDP 0.0.0.0:55165 *:*
UDP 0.0.0.0:55166 *:*
UDP 0.0.0.0:55167 *:*
UDP 0.0.0.0:55168 *:*
UDP 0.0.0.0:55169 *:*
UDP 0.0.0.0:55170 *:*
UDP 0.0.0.0:55171 *:*
UDP 0.0.0.0:55172 *:*
UDP 0.0.0.0:55173 *:*
UDP 0.0.0.0:55174 *:*
UDP 0.0.0.0:55175 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 163/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55176 *:*
UDP 0.0.0.0:55177 *:*
UDP 0.0.0.0:55178 *:*
UDP 0.0.0.0:55179 *:*
UDP 0.0.0.0:55180 *:*
UDP 0.0.0.0:55181 *:*
UDP 0.0.0.0:55182 *:*
UDP 0.0.0.0:55183 *:*
UDP 0.0.0.0:55184 *:*
UDP 0.0.0.0:55185 *:*
UDP 0.0.0.0:55186 *:*
UDP 0.0.0.0:55187 *:*
UDP 0.0.0.0:55188 *:*
UDP 0.0.0.0:55189 *:*
UDP 0.0.0.0:55190 *:*
UDP 0.0.0.0:55191 *:*
UDP 0.0.0.0:55192 *:*
UDP 0.0.0.0:55193 *:*
UDP 0.0.0.0:55194 *:*
UDP 0.0.0.0:55195 *:*
UDP 0.0.0.0:55196 *:*
UDP 0.0.0.0:55197 *:*
UDP 0.0.0.0:55198 *:*
UDP 0.0.0.0:55199 *:*
UDP 0.0.0.0:55200 *:*
UDP 0.0.0.0:55201 *:*
UDP 0.0.0.0:55202 *:*
UDP 0.0.0.0:55203 *:*
UDP 0.0.0.0:55204 *:*
UDP 0.0.0.0:55205 *:*
UDP 0.0.0.0:55206 *:*
UDP 0.0.0.0:55207 *:*
UDP 0.0.0.0:55208 *:*
UDP 0.0.0.0:55209 *:*
UDP 0.0.0.0:55210 *:*
UDP 0.0.0.0:55211 *:*
UDP 0.0.0.0:55212 *:*
UDP 0.0.0.0:55213 *:*
UDP 0.0.0.0:55214 *:*
UDP 0.0.0.0:55215 *:*
UDP 0.0.0.0:55216 *:*
UDP 0.0.0.0:55217 *:*
UDP 0.0.0.0:55218 *:*
UDP 0.0.0.0:55219 *:*
UDP 0.0.0.0:55220 *:*
UDP 0.0.0.0:55221 *:*
UDP 0.0.0.0:55222 *:*
UDP 0.0.0.0:55223 *:*
UDP 0.0.0.0:55224 *:*
UDP 0.0.0.0:55225 *:*
UDP 0.0.0.0:55226 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 164/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55227 *:*
UDP 0.0.0.0:55228 *:*
UDP 0.0.0.0:55229 *:*
UDP 0.0.0.0:55230 *:*
UDP 0.0.0.0:55231 *:*
UDP 0.0.0.0:55232 *:*
UDP 0.0.0.0:55233 *:*
UDP 0.0.0.0:55234 *:*
UDP 0.0.0.0:55235 *:*
UDP 0.0.0.0:55236 *:*
UDP 0.0.0.0:55237 *:*
UDP 0.0.0.0:55238 *:*
UDP 0.0.0.0:55239 *:*
UDP 0.0.0.0:55240 *:*
UDP 0.0.0.0:55241 *:*
UDP 0.0.0.0:55242 *:*
UDP 0.0.0.0:55243 *:*
UDP 0.0.0.0:55244 *:*
UDP 0.0.0.0:55245 *:*
UDP 0.0.0.0:55246 *:*
UDP 0.0.0.0:55247 *:*
UDP 0.0.0.0:55248 *:*
UDP 0.0.0.0:55249 *:*
UDP 0.0.0.0:55250 *:*
UDP 0.0.0.0:55251 *:*
UDP 0.0.0.0:55252 *:*
UDP 0.0.0.0:55253 *:*
UDP 0.0.0.0:55254 *:*
UDP 0.0.0.0:55255 *:*
UDP 0.0.0.0:55256 *:*
UDP 0.0.0.0:55257 *:*
UDP 0.0.0.0:55258 *:*
UDP 0.0.0.0:55259 *:*
UDP 0.0.0.0:55260 *:*
UDP 0.0.0.0:55261 *:*
UDP 0.0.0.0:55262 *:*
UDP 0.0.0.0:55263 *:*
UDP 0.0.0.0:55264 *:*
UDP 0.0.0.0:55265 *:*
UDP 0.0.0.0:55266 *:*
UDP 0.0.0.0:55267 *:*
UDP 0.0.0.0:55268 *:*
UDP 0.0.0.0:55269 *:*
UDP 0.0.0.0:55270 *:*
UDP 0.0.0.0:55271 *:*
UDP 0.0.0.0:55272 *:*
UDP 0.0.0.0:55273 *:*
UDP 0.0.0.0:55274 *:*
UDP 0.0.0.0:55275 *:*
UDP 0.0.0.0:55276 *:*
UDP 0.0.0.0:55277 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 165/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55278 *:*
UDP 0.0.0.0:55279 *:*
UDP 0.0.0.0:55280 *:*
UDP 0.0.0.0:55281 *:*
UDP 0.0.0.0:55282 *:*
UDP 0.0.0.0:55283 *:*
UDP 0.0.0.0:55284 *:*
UDP 0.0.0.0:55285 *:*
UDP 0.0.0.0:55286 *:*
UDP 0.0.0.0:55287 *:*
UDP 0.0.0.0:55288 *:*
UDP 0.0.0.0:55289 *:*
UDP 0.0.0.0:55290 *:*
UDP 0.0.0.0:55291 *:*
UDP 0.0.0.0:55292 *:*
UDP 0.0.0.0:55293 *:*
UDP 0.0.0.0:55294 *:*
UDP 0.0.0.0:55295 *:*
UDP 0.0.0.0:55296 *:*
UDP 0.0.0.0:55297 *:*
UDP 0.0.0.0:55298 *:*
UDP 0.0.0.0:55299 *:*
UDP 0.0.0.0:55300 *:*
UDP 0.0.0.0:55301 *:*
UDP 0.0.0.0:55302 *:*
UDP 0.0.0.0:55303 *:*
UDP 0.0.0.0:55304 *:*
UDP 0.0.0.0:55305 *:*
UDP 0.0.0.0:55306 *:*
UDP 0.0.0.0:55307 *:*
UDP 0.0.0.0:55308 *:*
UDP 0.0.0.0:55309 *:*
UDP 0.0.0.0:55310 *:*
UDP 0.0.0.0:55311 *:*
UDP 0.0.0.0:55312 *:*
UDP 0.0.0.0:55313 *:*
UDP 0.0.0.0:55314 *:*
UDP 0.0.0.0:55315 *:*
UDP 0.0.0.0:55316 *:*
UDP 0.0.0.0:55317 *:*
UDP 0.0.0.0:55318 *:*
UDP 0.0.0.0:55319 *:*
UDP 0.0.0.0:55320 *:*
UDP 0.0.0.0:55321 *:*
UDP 0.0.0.0:55322 *:*
UDP 0.0.0.0:55323 *:*
UDP 0.0.0.0:55324 *:*
UDP 0.0.0.0:55325 *:*
UDP 0.0.0.0:55326 *:*
UDP 0.0.0.0:55327 *:*
UDP 0.0.0.0:55328 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 166/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55329 *:*
UDP 0.0.0.0:55330 *:*
UDP 0.0.0.0:55331 *:*
UDP 0.0.0.0:55332 *:*
UDP 0.0.0.0:55333 *:*
UDP 0.0.0.0:55334 *:*
UDP 0.0.0.0:55335 *:*
UDP 0.0.0.0:55336 *:*
UDP 0.0.0.0:55337 *:*
UDP 0.0.0.0:55338 *:*
UDP 0.0.0.0:55339 *:*
UDP 0.0.0.0:55340 *:*
UDP 0.0.0.0:55341 *:*
UDP 0.0.0.0:55342 *:*
UDP 0.0.0.0:55343 *:*
UDP 0.0.0.0:55344 *:*
UDP 0.0.0.0:55345 *:*
UDP 0.0.0.0:55346 *:*
UDP 0.0.0.0:55347 *:*
UDP 0.0.0.0:55348 *:*
UDP 0.0.0.0:55349 *:*
UDP 0.0.0.0:55350 *:*
UDP 0.0.0.0:55351 *:*
UDP 0.0.0.0:55352 *:*
UDP 0.0.0.0:55353 *:*
UDP 0.0.0.0:55354 *:*
UDP 0.0.0.0:55355 *:*
UDP 0.0.0.0:55356 *:*
UDP 0.0.0.0:55357 *:*
UDP 0.0.0.0:55358 *:*
UDP 0.0.0.0:55359 *:*
UDP 0.0.0.0:55360 *:*
UDP 0.0.0.0:55361 *:*
UDP 0.0.0.0:55362 *:*
UDP 0.0.0.0:55363 *:*
UDP 0.0.0.0:55364 *:*
UDP 0.0.0.0:55365 *:*
UDP 0.0.0.0:55366 *:*
UDP 0.0.0.0:55367 *:*
UDP 0.0.0.0:55368 *:*
UDP 0.0.0.0:55369 *:*
UDP 0.0.0.0:55370 *:*
UDP 0.0.0.0:55371 *:*
UDP 0.0.0.0:55372 *:*
UDP 0.0.0.0:55373 *:*
UDP 0.0.0.0:55374 *:*
UDP 0.0.0.0:55375 *:*
UDP 0.0.0.0:55376 *:*
UDP 0.0.0.0:55377 *:*
UDP 0.0.0.0:55378 *:*
UDP 0.0.0.0:55379 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 167/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55380 *:*
UDP 0.0.0.0:55381 *:*
UDP 0.0.0.0:55382 *:*
UDP 0.0.0.0:55383 *:*
UDP 0.0.0.0:55384 *:*
UDP 0.0.0.0:55385 *:*
UDP 0.0.0.0:55386 *:*
UDP 0.0.0.0:55387 *:*
UDP 0.0.0.0:55388 *:*
UDP 0.0.0.0:55389 *:*
UDP 0.0.0.0:55390 *:*
UDP 0.0.0.0:55391 *:*
UDP 0.0.0.0:55392 *:*
UDP 0.0.0.0:55393 *:*
UDP 0.0.0.0:55394 *:*
UDP 0.0.0.0:55395 *:*
UDP 0.0.0.0:55396 *:*
UDP 0.0.0.0:55397 *:*
UDP 0.0.0.0:55398 *:*
UDP 0.0.0.0:55399 *:*
UDP 0.0.0.0:55400 *:*
UDP 0.0.0.0:55401 *:*
UDP 0.0.0.0:55402 *:*
UDP 0.0.0.0:55403 *:*
UDP 0.0.0.0:55404 *:*
UDP 0.0.0.0:55405 *:*
UDP 0.0.0.0:55406 *:*
UDP 0.0.0.0:55407 *:*
UDP 0.0.0.0:55408 *:*
UDP 0.0.0.0:55409 *:*
UDP 0.0.0.0:55410 *:*
UDP 0.0.0.0:55411 *:*
UDP 0.0.0.0:55412 *:*
UDP 0.0.0.0:55413 *:*
UDP 0.0.0.0:55414 *:*
UDP 0.0.0.0:55415 *:*
UDP 0.0.0.0:55416 *:*
UDP 0.0.0.0:55417 *:*
UDP 0.0.0.0:55418 *:*
UDP 0.0.0.0:55419 *:*
UDP 0.0.0.0:55420 *:*
UDP 0.0.0.0:55421 *:*
UDP 0.0.0.0:55422 *:*
UDP 0.0.0.0:55423 *:*
UDP 0.0.0.0:55424 *:*
UDP 0.0.0.0:55425 *:*
UDP 0.0.0.0:55426 *:*
UDP 0.0.0.0:55427 *:*
UDP 0.0.0.0:55428 *:*
UDP 0.0.0.0:55429 *:*
UDP 0.0.0.0:55430 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 168/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55431 *:*
UDP 0.0.0.0:55432 *:*
UDP 0.0.0.0:55433 *:*
UDP 0.0.0.0:55434 *:*
UDP 0.0.0.0:55435 *:*
UDP 0.0.0.0:55436 *:*
UDP 0.0.0.0:55437 *:*
UDP 0.0.0.0:55438 *:*
UDP 0.0.0.0:55439 *:*
UDP 0.0.0.0:55440 *:*
UDP 0.0.0.0:55441 *:*
UDP 0.0.0.0:55442 *:*
UDP 0.0.0.0:55443 *:*
UDP 0.0.0.0:55444 *:*
UDP 0.0.0.0:55445 *:*
UDP 0.0.0.0:55446 *:*
UDP 0.0.0.0:55447 *:*
UDP 0.0.0.0:55448 *:*
UDP 0.0.0.0:55449 *:*
UDP 0.0.0.0:55450 *:*
UDP 0.0.0.0:55451 *:*
UDP 0.0.0.0:55452 *:*
UDP 0.0.0.0:55453 *:*
UDP 0.0.0.0:55454 *:*
UDP 0.0.0.0:55455 *:*
UDP 0.0.0.0:55456 *:*
UDP 0.0.0.0:55457 *:*
UDP 0.0.0.0:55458 *:*
UDP 0.0.0.0:55459 *:*
UDP 0.0.0.0:55460 *:*
UDP 0.0.0.0:55461 *:*
UDP 0.0.0.0:55462 *:*
UDP 0.0.0.0:55463 *:*
UDP 0.0.0.0:55464 *:*
UDP 0.0.0.0:55465 *:*
UDP 0.0.0.0:55466 *:*
UDP 0.0.0.0:55467 *:*
UDP 0.0.0.0:55468 *:*
UDP 0.0.0.0:55469 *:*
UDP 0.0.0.0:55470 *:*
UDP 0.0.0.0:55471 *:*
UDP 0.0.0.0:55472 *:*
UDP 0.0.0.0:55473 *:*
UDP 0.0.0.0:55474 *:*
UDP 0.0.0.0:55475 *:*
UDP 0.0.0.0:55476 *:*
UDP 0.0.0.0:55477 *:*
UDP 0.0.0.0:55478 *:*
UDP 0.0.0.0:55479 *:*
UDP 0.0.0.0:55480 *:*
UDP 0.0.0.0:55481 *:*

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 169/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55482 *:*
UDP 0.0.0.0:55483 *:*
UDP 0.0.0.0:55484 *:*
UDP 0.0.0.0:55485 *:*
UDP 0.0.0.0:55486 *:*
UDP 0.0.0.0:55487 *:*
UDP 0.0.0.0:55488 *:*
UDP 0.0.0.0:55489 *:*
UDP 0.0.0.0:55490 *:*
UDP 0.0.0.0:55491 *:*
UDP 0.0.0.0:55492 *:*
UDP 0.0.0.0:55493 *:*
UDP 0.0.0.0:55494 *:*
UDP 0.0.0.0:55495 *:*
UDP 0.0.0.0:55496 *:*
UDP 0.0.0.0:55497 *:*
UDP 0.0.0.0:55498 *:*
UDP 0.0.0.0:55499 *:*
UDP 0.0.0.0:55500 *:*
UDP 0.0.0.0:55501 *:*
UDP 0.0.0.0:55502 *:*
UDP 0.0.0.0:55503 *:*
UDP 0.0.0.0:55504 *:*
UDP 0.0.0.0:55505 *:*
UDP 0.0.0.0:55506 *:*
UDP 0.0.0.0:55507 *:*
UDP 0.0.0.0:55508 *:*
UDP 0.0.0.0:55509 *:*
UDP 0.0.0.0:55510 *:*
UDP 0.0.0.0:55511 *:*
UDP 0.0.0.0:55512 *:*
UDP 0.0.0.0:55513 *:*
UDP 0.0.0.0:55514 *:*
UDP 0.0.0.0:55515 *:*
UDP 0.0.0.0:55516 *:*
UDP 0.0.0.0:55517 *:*
UDP 0.0.0.0:55518 *:*
UDP 0.0.0.0:55519 *:*
UDP 0.0.0.0:55520 *:*
UDP 0.0.0.0:55521 *:*
UDP 0.0.0.0:55522 *:*
UDP 0.0.0.0:55523 *:*
UDP 0.0.0.0:55524 *:*
UDP 10.184.234.79:53 *:*
UDP 10.184.234.79:88 *:*
UDP 10.184.234.79:137 *:*
UDP 10.184.234.79:138 *:*
UDP 10.184.234.79:464 *:*
UDP 127.0.0.1:53 *:*
UDP 127.0.0.1:49223 127.0.0.1:49223
UDP 127.0.0.1:49738 127.0.0.1:49738

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 170/210
12/13/24, 4:22 PM AD1
UDP 127.0.0.1:50011 127.0.0.1:50011
UDP 127.0.0.1:51185 127.0.0.1:51185
UDP 127.0.0.1:53395 127.0.0.1:53395
UDP 127.0.0.1:55525 127.0.0.1:55525
UDP 127.0.0.1:55526 127.0.0.1:55526
UDP 127.0.0.1:56217 127.0.0.1:56217
UDP 127.0.0.1:57621 127.0.0.1:57621
UDP 127.0.0.1:58790 127.0.0.1:58790
UDP 127.0.0.1:61487 127.0.0.1:61487
UDP 127.0.0.1:62221 127.0.0.1:62221
UDP [::]:123 *:*
UDP [::]:3389 *:*
UDP [::]:51023 *:*
UDP [::]:53022 *:*
UDP [::1]:53 *:*
UDP [::1]:53020 *:*

64582 - Netstat Connection Information -

Synopsis
Nessus was able to parse the results of the 'netstat' command on the remote host.

Description
The remote host has listening ports or established connections that Nessus was able to extract from the results of the 'netstat' command.

Note: The output for this plugin can be very long, and is not shown by default. To display it, enable verbose reporting in scan settings.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2013/02/13, Modified: 2023/05/23

Plugin Output

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 171/210
12/13/24, 4:22 PM AD1

tcp/0
report output too big - ending list here

174736 - Netstat Ingress Connections -

Synopsis
External connections are enumerated via the 'netstat' command.

Description
This plugin runs 'netstat' to enumerate any non-private connections to the scan target.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2023/04/25, Modified: 2024/11/22

Plugin Output
tcp/0

Netstat output indicated the following connections from non-private IP addresses:

20.49.150.241 connected to port 54337 on the scan target.


20.190.163.21 connected to port 54371 on the scan target.
20.189.173.21 connected to port 54372 on the scan target.
13.107.21.239 connected to port 54388 on the scan target.
52.111.240.41 connected to port 54395 on the scan target.
13.107.6.158 connected to port 54398 on the scan target.

NOTE: This list may be truncated depending on the scan verbosity settings.

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 172/210
12/13/24, 4:22 PM AD1

10884 - Network Time Protocol (NTP) Server Detection -

Synopsis
An NTP server is listening on the remote host.

Description
An NTP server is listening on port 123. If not securely configured, it may provide information about its version, current date, current time, and possibly system
information.

See Also

http://www.ntp.org

Solution
n/a

Risk Factor
None

References

XREF IAVT:0001-T-0934

Plugin Information
Published: 2015/03/20, Modified: 2021/02/24

Plugin Output
udp/123/ntp

An NTP service has been discovered, listening on port 123.

No sensitive information has been disclosed.

Version : unknown

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 173/210
12/13/24, 4:22 PM AD1

11936 - OS Identification -

Synopsis
It is possible to guess the remote operating system.

Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also
possible sometimes to guess the version of the operating system.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2003/12/09, Modified: 2024/10/14

Plugin Output
tcp/0

Remote operating system : Microsoft Windows


Confidence level : 70
Method : HTTP

Not all fingerprints could give a match. If you think that these
signatures would help us improve OS fingerprinting, please submit
them by visiting https://www.tenable.com/research/submitsignatures.

NTP:!:unknown
HTTP:Server: Microsoft-HTTPAPI/2.0

SSLcert:!:i/CN:Nessus Certification Authorityi/O:Nessus Users Unitedi/OU:Nessus Certification Authoritys/CN:AD01s/O:Nessus Users


Uniteds/OU:Nessus Server
5d045d7c9b55f527e7f14a54100d9f79f499579e
i/CN:AD01.tayninh.dcs.vns/CN:AD01.tayninh.dcs.vn
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 174/210
12/13/24, 4:22 PM AD1
b69d594fa47b6119adba03bb66f64e36dbb08bf9

The remote host is running Microsoft Windows

97993 - OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH Library) -

Synopsis
Information about the remote host can be disclosed via an authenticated session.

Description
Nessus was able to login to the remote host using SSH or local commands and extract the list of installed packages.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2017/05/30, Modified: 2024/10/15

Plugin Output
tcp/0

Nessus can run commands on localhost to check if patches are applied.

Credentialed checks of Windows are not supported using SSH.

The remote host is not currently supported by this plugin.

Runtime : 1.34757 seconds

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 175/210
12/13/24, 4:22 PM AD1

117886 - OS Security Patch Assessment Not Available -

Synopsis
OS Security Patch Assessment is not available.

Description
OS Security Patch Assessment is not available on the remote host.
This does not necessarily indicate a problem with the scan.
Credentials may not have been provided, OS security patch assessment may not be supported for the target, the target may not have been identified, or another
issue may have occurred that prevented OS security patch assessment from being available. See plugin output for details.

This plugin reports non-failure information impacting the availability of OS Security Patch Assessment. Failure information is reported by plugin 21745 : 'OS
Security Patch Assessment failed'. If a target host is not supported for OS Security Patch Assessment, plugin 110695 : 'OS Security Patch Assessment Checks Not
Supported' will report concurrently with this plugin.

Solution
n/a

Risk Factor
None

References

XREF IAVB:0001-B-0515

Plugin Information
Published: 2018/10/02, Modified: 2021/07/12

Plugin Output
tcp/0

The following issues were reported :

- Plugin : ssh_get_info2.nasl
Plugin ID : 97993

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 176/210
12/13/24, 4:22 PM AD1
Plugin Name : OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH Library)
Protocol : LOCALHOST
Message :
Credentialed checks of Windows are not supported using SSH.

- Plugin : no_local_checks_credentials.nasl
Plugin ID : 110723
Plugin Name : Target Credential Status by Authentication Protocol - No Credentials Provided
Message :
Credentials were not provided for detected SMB service.

66173 - RDP Screenshot -

Synopsis
It is possible to take a screenshot of the remote login screen.

Description
This script attempts to connect to the remote host via RDP (Remote Desktop Protocol) and attempts to take a screenshot of the login screen.

While this is not a vulnerability by itself, some versions of Windows display the names of the users who can connect and which ones are connected already.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2013/04/22, Modified: 2024/07/17

Plugin Output
tcp/3389/msrdp

It was possible to gather the following screenshot of the remote login screen.

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 177/210
12/13/24, 4:22 PM AD1

10940 - Remote Desktop Protocol Service Detection -

Synopsis
The remote host has an remote desktop protocol service enabled.

Description
The Remote Desktop Protocol allows a user to remotely obtain a graphical login (and therefore act as a local user on the remote host).

If an attacker gains a valid login and password, this service could be used to gain further access on the remote host. An attacker may also use this service to mount
a dictionary attack against the remote host to try to log in remotely.

Note that RDP (the Remote Desktop Protocol) is vulnerable to Man-in-the-middle attacks, making it easy for attackers to steal the credentials of legitimate users by
impersonating the Windows server.

Solution
Disable the service if you do not use it, and do not allow this service to run across the Internet.

Risk Factor
None

Plugin Information
Published: 2002/04/20, Modified: 2023/08/21

Plugin Output
tcp/3389/msrdp

56984 - SSL / TLS Versions Supported -

Synopsis
The remote service encrypts communications.

Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 178/210
12/13/24, 4:22 PM AD1

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2011/12/01, Modified: 2023/07/10

Plugin Output
tcp/3389/msrdp

This port supports TLSv1.0/TLSv1.1/TLSv1.2.

56984 - SSL / TLS Versions Supported -

Synopsis
The remote service encrypts communications.

Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2011/12/01, Modified: 2023/07/10
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 179/210
12/13/24, 4:22 PM AD1

Plugin Output
tcp/8834/www

This port supports TLSv1.3/TLSv1.2.

10863 - SSL Certificate Information -

Synopsis
This plugin displays the SSL certificate.

Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2008/05/19, Modified: 2021/02/03

Plugin Output
tcp/3389/msrdp

Subject Name:

Common Name: AD01.tayninh.dcs.vn

Issuer Name:

Common Name: AD01.tayninh.dcs.vn

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 180/210
12/13/24, 4:22 PM AD1
Serial Number: 4E B3 6E BC 49 5D A9 95 4E 80 71 60 29 A2 B7 4F

Version: 3

Signature Algorithm: SHA-256 With RSA Encryption

Not Valid Before: Nov 10 07:01:22 2024 GMT


Not Valid After: May 12 07:01:22 2025 GMT

Public Key Info:

Algorithm: RSA Encryption


Key Length: 2048 bits
Public Key: 00 BC 2F 9B 32 E4 A4 B7 07 32 0A 6D 2F 0D 04 49 2B BD 4F 97
A3 5B 43 CB F6 00 A3 80 B5 A3 FC 22 D7 CA 9E F4 FD 3A F7 7D
30 CF E2 CE 9E D7 DD 55 93 9C 8E A7 69 66 86 7D 84 E8 C6 A0
94 D5 9E 97 AF 9E 7B F8 CF 77 D3 8B BE C9 9A 28 C3 7A 06 20
35 89 97 9F 66 BD 5E AE 49 B8 EA 50 CE 1F 29 82 68 A8 C9 8A
58 80 A8 98 12 65 5D E5 AB 7A 45 67 9B 95 43 F0 E0 38 15 8E
A3 86 E4 A4 F7 72 31 E4 9A 37 67 B5 F2 6C AD A8 43 A2 D2 50
E1 E4 D3 CD B5 B3 4E 7A 35 30 36 7F 93 82 97 EA 54 86 80 AF
9E FA F2 32 39 58 97 80 6D F6 C9 01 7E 97 EF 15 F2 E5 71 3C
A9 6C C5 7A 3C 6E 93 E8 E8 83 F9 EC 4D D9 B7 7B 35 C8 26 F0
5F 78 67 50 F9 76 DE 1F B5 F1 B1 8A 68 70 AF 86 CE 1B DE 97
B8 7C 7A FD F3 E3 A5 D1 AD 7C 7F 7C 6E 39 45 F7 C9 17 7A DA
63 83 2B 5F A4 C5 8E C2 A5 1E 15 2A C8 83 75 9E 89
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits


Signature: 00 89 5C 5F D4 6A 98 DD 33 64 6C B0 97 BD 9B 63 72 AD 4D C9
D3 A8 11 AE F2 39 A6 CE AF 21 6E 99 DB 1B 23 09 96 30 C9 08
FA 81 1D 8A 16 43 16 EA D3 20 30 66 59 AA 85 A4 4C 0E B5 94
DD 88 D1 31 83 72 A0 F4 5A 82 71 C6 A0 FA DB C7 A6 58 1E 72
52 A7 E5 E8 7A C9 54 8C 75 33 8E D6 41 09 42 4C 9E 96 E1 08
6B D5 8A D5 5D 13 8F 0E 1C C0 4D BF B3 36 D9 5A B3 B7 5C A1
BD FD D0 BD 66 FB CE 57 08 9A CE CC E1 5F 80 36 37 FD 85 35
9D 65 C1 6F 7D 08 FF 5B F9 4E 86 F4 B2 4C 50 E9 BB 63 BE 2B
87 80 34 48 14 F0 9B E5 79 82 97 58 5C 8B 56 9D A2 A9 82 C8
B6 3F ED 7C 5D 39 DC 21 87 B1 20 26 33 6A 7E E2 E5 7F 55 85
0A 35 F1 9C 72 0B E2 58 10 A2 2F AF B9 CE 3F 35 C8 EC DE 85
DD A1 C5 86 FF 63 52 BE A2 35 4F 7A BF F3 6C 8D 8E 40 57 E7
62 5F 66 01 10 E0 4F DA 3F 62 75 4A C2 14 9F 7C 69

Extension: Extended Key Usage (2.5.29.37)


Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)

Extension: Key Usage (2.5.29.15)


Critical: 0
Key Usage: Key Encipherment, Data Encipherment

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 181/210
12/13/24, 4:22 PM AD1

Fingerprints :

SHA-256 Fingerprint: 3E C3 8D 03 3C 73 B2 06 B2 80 72 1A 35 A5 44 55 04 08 55 1C
22 7D 40 56 4C 87 7E CA 38 0C BC CE
SHA-1 Fingerprint: B6 9D 59 4F A4 7B 61 19 AD BA 03 BB 66 F6 4E 36 DB B0 8B F9
MD5 Fingerprint: 01 5A 7E 46 B5 26 BE DE 02 E8 57 87 FC AE AD 83

PEM certificate :

-----BEGIN CERTIFICATE-----
MIIC6jCCAdKgAwIBAgIQTrNuvEldqZVOgHFgKaK3TzANBgkqhkiG9w0BAQsFADAeMRwwGgYDVQQDExNBRDAxLnRheW5pbmguZGNzLnZuMB4XDTI0MTExMDA3MDEyMloXDTI1
MDUxMjA3MDEyMlowHjEcMBoGA1UEAxMTQUQwMS50YXluaW5oLmRjcy52bjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALwvmzLkpLcHMgptLw0ESSu9T5ejW0PL
9gCjgLWj/CLXyp70/Tr3fTDP4s6e191Vk5yOp2lmhn2E6MaglNWel6+ee/jPd9OLvsmaKMN6BiA1iZefZr1erkm46lDOHymCaKjJiliAqJgSZV3lq3pFZ5uVQ/DgOBWOo4bk
pPdyMeSaN2e18mytqEOi0lDh5NPNtbNOejUwNn+TgpfqVIaAr5768jI5WJeAbfbJAX6X7xXy5XE8qWzFejxuk+jog/nsTdm3ezXIJvBfeGdQ+XbeH7XxsYpocK+Gzhvel7h8
ev3z46XRrXx/fG45RffJF3raY4MrX6TFjsKlHhUqyIN1nokCAwEAAaMkMCIwEwYDVR0lBAwwCgYIKwYBBQUHAwEwCwYDVR0PBAQDAgQwMA0GCSqGSIb3DQEBCwUAA4IBAQCJ
XF/UapjdM2RssJe9m2NyrU3J06gRrvI5ps6vIW6Z2xsjCZYwyQj6gR2KFkMW6tMgMGZZqoWkTA61lN2I0TGDcqD0WoJxxqD628emWB5yUqfl6HrJVIx1M47WQQlCTJ6W4Qhr
1YrVXROPDhzATb+zNtlas7dcob390L1m+85XCJrOzOFfgDY3/YU1nWXBb30I/1v5Tob0skxQ6btjviuHgDRIFPCb5XmCl1hci1adoqmCyLY/7XxdOdwhh7EgJjNqfuLlf1WF
CjXxnHIL4lgQoi+vuc4/Ncjs3oXdocWG/2NSvqI1T3q/82yNjkBX52JfZgEQ4E/aP2J1SsIUn3xp
-----END CERTIFICATE-----

10863 - SSL Certificate Information -

Synopsis
This plugin displays the SSL certificate.

Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2008/05/19, Modified: 2021/02/03
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 182/210
12/13/24, 4:22 PM AD1

Plugin Output
tcp/8834/www

Subject Name:

Organization: Nessus Users United


Organization Unit: Nessus Server
Locality: New York
Country: US
State/Province: NY
Common Name: AD01

Issuer Name:

Organization: Nessus Users United


Organization Unit: Nessus Certification Authority
Locality: New York
Country: US
State/Province: NY
Common Name: Nessus Certification Authority

Serial Number: 30 38

Version: 3

Signature Algorithm: SHA-256 With RSA Encryption

Not Valid Before: Dec 13 08:25:39 2024 GMT


Not Valid After: Dec 12 08:25:39 2028 GMT

Public Key Info:

Algorithm: RSA Encryption


Key Length: 2048 bits
Public Key: 00 AB 84 9C 1B C6 55 9F FE FF 1A B0 EA 44 C7 E7 7B 04 02 1A
73 DC 54 D6 98 D0 26 2E DB C4 4E C8 C0 57 2E D5 9F BF DB 03
9C 8E 92 E4 86 53 8D E7 02 05 38 1A 7F 82 1D B4 73 7C 2E BA
33 8F CE 8C 14 CA BF 87 07 BE 18 21 46 FE 34 E6 2D F0 06 97
25 3D 4A EC 36 17 3E E1 79 22 63 0D 6C F0 7A 7D 4F EA EA 65
28 84 D4 F4 41 0B 77 91 63 FA CD 7D 3A 9A 52 D9 C5 D4 18 BA
06 43 F1 2F 1D 4E 5E C0 D5 DA 76 51 7F 77 CC 4E 8F 5E BA 63
A5 12 B9 59 BA 8D 07 74 1C 50 27 70 07 29 92 2B C2 5D 4F 04
44 8C F7 32 62 08 A1 C4 7A 6D 3D 27 4E 28 56 BF 61 F5 2C 43
0A 94 3C CE E7 42 13 AC 5C 6E 9E D5 BE F5 32 C8 9C 82 F1 70
EE C2 B4 89 82 E7 E9 90 3D 76 DE 12 4F EB 50 43 BD F9 8B 20
DB 67 7A 56 52 14 94 3E 72 11 49 2D C6 E3 D1 EC 6B 39 91 E0
18 C3 4F BA CA 77 67 C7 58 51 BF 9D D9 DB 28 EA D7
Exponent: 01 00 01
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 183/210
12/13/24, 4:22 PM AD1

Signature Length: 256 bytes / 2048 bits


Signature: 00 29 05 CE 1D D4 88 71 11 78 06 C7 E3 E5 88 7C 51 43 CB E6
2F 37 37 DC 22 27 B6 79 F9 A5 EE 8F 26 6E 2A 8A 93 4A 0F 73
AC F0 2B 29 65 D6 E2 81 7F CA 53 53 70 A8 2E 70 FF 8C 62 DA
AC 7E 29 05 16 AD 77 27 37 68 7A 33 EF A1 67 CB 7E E4 3D F7
19 FA FF B6 8B 93 7A 73 13 ED CB 0F 95 19 C0 40 A9 8B 12 1E
4F FE 5F 1F 7F 4B 98 A5 CE D0 74 FD FB 44 1C D2 3C 2B 0B 01
3C 08 B0 8A 9D 16 A8 2A 84 E6 52 88 AC 27 F4 46 95 81 D0 4B
0E A7 66 1A B9 8C DF 2D 82 19 CC 1C 72 44 6F 33 6E 3B 52 00
17 DA 42 1A F3 85 88 9C 6C DD 32 26 51 D2 7E BF 7E F5 B3 5D
E9 BA EE 38 64 F3 B7 31 7B C6 F8 1C 65 52 F3 42 0E 4C 8D 25
83 9B 40 30 E9 95 9A 8B BD 42 44 BC 0D 34 65 40 C6 EC 52 63
E3 78 1D 9F F4 CF 05 5B EE E7 0A 5F D1 D5 3D CD 9D 95 54 75
6B A5 2D BA 6F B0 E4 08 A1 DD 6C 21 AA CA 9B 84 D7

Extension: 2.16.840.1.113730.1.1
Critical: 0
Data: 03 02 06 40

Extension: Key Usage (2.5.29.15)


Critical: 1
Key Usage: Digital Signature, Non Repudiation, Key Encipherment

Extension: Subject Key Identifier (2.5.29.14)


Critical: 0
Subject Key Identifier: 0C 11 A3 04 7B F6 6A 2E E8 08 01 CA C0 8A 68 14 EA 6E 03 69

Extension: Authority Key Identifier (2.5.29.35)


Critical: 0
Key Identifier: 01 5E DA 45 B0 DE E3 E4 53 E2 00 2E 45 DB 85 8F 6F FB FC 60

Extension: Extended Key Usage (2.5.29.37)


Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)

Fingerprints :

SHA-256 Fingerprint: F4 3A FF 1F 8C 4E 52 AE C2 C8 84 1D C7 92 70 2F 55 FE 6B E0
85 CD E0 34 6A 78 CD 38 F4 39 C5 17
SHA-1 Fingerprint: 5D 04 5D 7C 9B 55 F5 27 E7 F1 4A 54 10 0D 9F 79 F4 99 57 9E
MD5 Fingerprint: 54 2D 5B 61 C5 E7 45 BB 80 F4 D6 A5 33 5C 6C 0A

PEM certificate :

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 184/210
12/13/24, 4:22 PM AD1
-----BEGIN CERTIFICATE-----
MIIEBjCCAu6gAwIBAgICMDgwDQYJKoZIhvcNAQELBQAwgZ0xHDAaBgNVBAoME05lc3N1cyBVc2VycyBVbml0ZWQxJzAlBgNVBAsMHk5lc3N1cyBDZXJ0aWZpY2F0aW9uIEF1
dGhvcml0eTERMA8GA1UEBwwITmV3IFlvcmsxCzAJBgNVBAYTAlVTMQswCQYDVQQIDAJOWTEnMCUGA1UEAwweTmVzc3VzIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTI0
MTIxMzA4MjUzOVoXDTI4MTIxMjA4MjUzOVowcjEcMBoGA1UECgwTTmVzc3VzIFVzZXJzIFVuaXRlZDEWMBQGA1UECwwNTmVzc3VzIFNlcnZlcjERMA8GA1UEBwwITmV3IFlv
cmsxCzAJBgNVBAYTAlVTMQswCQYDVQQIDAJOWTENMAsGA1UEAwwEQUQwMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKuEnBvGVZ/+/xqw6kTH53sEAhpz3FTW
mNAmLtvETsjAVy7Vn7/bA5yOkuSGU43nAgU4Gn+CHbRzfC66M4/OjBTKv4cHvhghRv405i3wBpclPUrsNhc+4XkiYw1s8Hp9T+rqZSiE1PRBC3eRY/rNfTqaUtnF1Bi6BkPx
Lx1OXsDV2nZRf3fMTo9eumOlErlZuo0HdBxQJ3AHKZIrwl1PBESM9zJiCKHEem09J04oVr9h9SxDCpQ8zudCE6xcbp7VvvUyyJyC8XDuwrSJgufpkD123hJP61BDvfmLINtn
elZSFJQ+chFJLcbj0exrOZHgGMNPusp3Z8dYUb+d2dso6tcCAwEAAaN6MHgwEQYJYIZIAYb4QgEBBAQDAgZAMA4GA1UdDwEB/wQEAwIF4DAdBgNVHQ4EFgQUDBGjBHv2ai7o
CAHKwIpoFOpuA2kwHwYDVR0jBBgwFoAUAV7aRbDe4+RT4gAuRduFj2/7/GAwEwYDVR0lBAwwCgYIKwYBBQUHAwEwDQYJKoZIhvcNAQELBQADggEBACkFzh3UiHEReAbH4+WI
fFFDy+YvNzfcIie2efml7o8mbiqKk0oPc6zwKyll1uKBf8pTU3CoLnD/jGLarH4pBRatdyc3aHoz76Fny37kPfcZ+v+2i5N6cxPtyw+VGcBAqYsSHk/+Xx9/S5ilztB0/ftE
HNI8KwsBPAiwip0WqCqE5lKIrCf0RpWB0EsOp2YauYzfLYIZzBxyRG8zbjtSABfaQhrzhYicbN0yJlHSfr9+9bNd6bruOGTztzF7xvgcZVLzQg5MjSWDm0Aw6ZWai71CRLwN
NGVAxuxSY+N4HZ/0zwVb7ucKX9HVPc2dlVR1a6Utum+w5Aih3WwhqsqbhNc=
-----END CERTIFICATE-----

70544 - SSL Cipher Block Chaining Cipher Suites Supported -

Synopsis
The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.

Description
The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic
Codebook (ECB) mode, but have the potential to leak information if used improperly.

See Also

https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2013/10/22, Modified: 2021/02/03
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 185/210
12/13/24, 4:22 PM AD1

Plugin Output
tcp/3389/msrdp

Here is the list of SSL CBC ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

21643 - SSL Cipher Suites Supported -

Synopsis
The remote service encrypts communications using SSL.

Description

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 186/210
12/13/24, 4:22 PM AD1

This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.

See Also

https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2006/06/05, Modified: 2024/09/11

Plugin Output
tcp/3389/msrdp

Here is the list of SSL ciphers supported by the remote server :


Each group is reported per SSL Version.

SSL Version : TLSv12


Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA256 0x00, 0x9E DH RSA AES-GCM(128) SHA256
DHE-RSA-AES256-SHA384 0x00, 0x9F DH RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256
RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 187/210
12/13/24, 4:22 PM AD1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256

SSL Version : TLSv11


Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1

SSL Version : TLSv1


Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 188/210
12/13/24, 4:22 PM AD1
Note that this service does not encrypt traffic by default but does
support upgrading to an encrypted connection using STARTTLS.

21643 - SSL Cipher Suites Supported -

Synopsis
The remote service encrypts communications using SSL.

Description
This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.

See Also

https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2006/06/05, Modified: 2024/09/11

Plugin Output
tcp/8834/www

Here is the list of SSL ciphers supported by the remote server :


Each group is reported per SSL Version.

SSL Version : TLSv13


High Strength Ciphers (>= 112-bit key)

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 189/210
12/13/24, 4:22 PM AD1
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
TLS_AES_128_GCM_SHA256 0x13, 0x01 - - AES-GCM(128) AEAD
TLS_AES_256_GCM_SHA384 0x13, 0x02 - - AES-GCM(256) AEAD
TLS_CHACHA20_POLY1305_SHA256 0x13, 0x03 - - ChaCha20-Poly1305(256) AEAD

SSL Version : TLSv12


High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

57041 - SSL Perfect Forward Secrecy Cipher Suites Supported -

Synopsis
The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.

Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot
be broken at a future date if the server's private key is compromised.

See Also

https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy

Solution
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 190/210
12/13/24, 4:22 PM AD1

n/a

Risk Factor
None

Plugin Information
Published: 2011/12/07, Modified: 2021/03/09

Plugin Output
tcp/3389/msrdp

Here is the list of SSL PFS ciphers supported by the remote server :

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA256 0x00, 0x9E DH RSA AES-GCM(128) SHA256
DHE-RSA-AES256-SHA384 0x00, 0x9F DH RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

57041 - SSL Perfect Forward Secrecy Cipher Suites Supported -

Synopsis

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 191/210
12/13/24, 4:22 PM AD1

The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.

Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot
be broken at a future date if the server's private key is compromised.

See Also

https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2011/12/07, Modified: 2021/03/09

Plugin Output
tcp/8834/www

Here is the list of SSL PFS ciphers supported by the remote server :

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 192/210
12/13/24, 4:22 PM AD1
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

156899 - SSL/TLS Recommended Cipher Suites -

Synopsis
The remote host advertises discouraged SSL/TLS ciphers.

Description
The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the following cipher suites:

TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256

TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305

This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or
more) years.

See Also

https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/

Solution
Only enable support for recommened cipher suites.

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 193/210
12/13/24, 4:22 PM AD1

Risk Factor
None

Plugin Information
Published: 2022/01/20, Modified: 2024/02/12

Plugin Output
tcp/3389/msrdp

The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below:

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA256 0x00, 0x9E DH RSA AES-GCM(128) SHA256
DHE-RSA-AES256-SHA384 0x00, 0x9F DH RSA AES-GCM(256) SHA384
RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256
RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 194/210
12/13/24, 4:22 PM AD1

22964 - Service Detection -

Synopsis
The remote service could be identified.

Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2007/08/19, Modified: 2024/03/26

Plugin Output
tcp/593/http-rpc-epmap

An http-rpc-epmap is running on this port.

22964 - Service Detection -

Synopsis
The remote service could be identified.

Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 195/210
12/13/24, 4:22 PM AD1

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2007/08/19, Modified: 2024/03/26

Plugin Output
tcp/636

The service closed the connection without sending any data.


It might be protected by some sort of TCP wrapper.

22964 - Service Detection -

Synopsis
The remote service could be identified.

Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 196/210
12/13/24, 4:22 PM AD1

Plugin Output
tcp/3269

The service closed the connection without sending any data.


It might be protected by some sort of TCP wrapper.

22964 - Service Detection -

Synopsis
The remote service could be identified.

Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2007/08/19, Modified: 2024/03/26

Plugin Output
tcp/5985/www

A web server is running on this port.

22964 - Service Detection -

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 197/210
12/13/24, 4:22 PM AD1

Synopsis
The remote service could be identified.

Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2007/08/19, Modified: 2024/03/26

Plugin Output
tcp/8834/www

A TLSv1.2 server answered on this port.

tcp/8834/www

A web server is running on this port through TLSv1.2.

22964 - Service Detection -

Synopsis
The remote service could be identified.

Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 198/210
12/13/24, 4:22 PM AD1

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2007/08/19, Modified: 2024/03/26

Plugin Output
tcp/47001/www

A web server is running on this port.

22964 - Service Detection -

Synopsis
The remote service could be identified.

Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2007/08/19, Modified: 2024/03/26

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 199/210
12/13/24, 4:22 PM AD1

Plugin Output
tcp/55952/ncacn_http

An ncacn_http server is running on this port.

42822 - Strict Transport Security (STS) Detection -

Synopsis
The remote web server implements Strict Transport Security.

Description
The remote web server implements Strict Transport Security (STS).
The goal of STS is to make sure that a user does not accidentally downgrade the security of his or her browser.

All unencrypted HTTP connections are redirected to HTTPS. The browser is expected to treat all cookies as 'secure' and to close the connection in the event of
potentially insecure situations.

See Also

http://www.nessus.org/u?2fb3aca6

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2009/11/16, Modified: 2019/11/22

Plugin Output
tcp/8834/www

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 200/210
12/13/24, 4:22 PM AD1

The STS header line is :

Strict-Transport-Security: max-age=31536000

121010 - TLS Version 1.1 Protocol Detection -

Synopsis
The remote service encrypts traffic using an older version of TLS.

Description
The remote service accepts connections encrypted using TLS 1.1.
TLS 1.1 lacks support for current and recommended cipher suites.
Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1

As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.

See Also

https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
http://www.nessus.org/u?c8ae820d

Solution
Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.

Risk Factor
None

References

XREF CWE:327

Plugin Information

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 201/210
12/13/24, 4:22 PM AD1

Published: 2019/01/08, Modified: 2023/04/19

Plugin Output
tcp/3389/msrdp

TLSv1.1 is enabled and the server supports at least one cipher.

136318 - TLS Version 1.2 Protocol Detection -

Synopsis
The remote service encrypts traffic using a version of TLS.

Description
The remote service accepts connections encrypted using TLS 1.2.

See Also

https://tools.ietf.org/html/rfc5246

Solution
N/A

Risk Factor
None

Plugin Information
Published: 2020/05/04, Modified: 2020/05/04

Plugin Output
tcp/3389/msrdp

TLSv1.2 is enabled and the server supports at least one cipher.

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 202/210
12/13/24, 4:22 PM AD1

136318 - TLS Version 1.2 Protocol Detection -

Synopsis
The remote service encrypts traffic using a version of TLS.

Description
The remote service accepts connections encrypted using TLS 1.2.

See Also

https://tools.ietf.org/html/rfc5246

Solution
N/A

Risk Factor
None

Plugin Information
Published: 2020/05/04, Modified: 2020/05/04

Plugin Output
tcp/8834/www

TLSv1.2 is enabled and the server supports at least one cipher.

138330 - TLS Version 1.3 Protocol Detection -

Synopsis

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 203/210
12/13/24, 4:22 PM AD1

The remote service encrypts traffic using a version of TLS.

Description
The remote service accepts connections encrypted using TLS 1.3.

See Also

https://tools.ietf.org/html/rfc8446

Solution
N/A

Risk Factor
None

Plugin Information
Published: 2020/07/09, Modified: 2023/12/13

Plugin Output
tcp/8834/www

TLSv1.3 is enabled and the server supports at least one cipher.

110723 - Target Credential Status by Authentication Protocol - No Credentials Provided -

Synopsis
Nessus was able to find common ports used for local checks, however, no credentials were provided in the scan policy.

Description
Nessus was not able to successfully authenticate directly to the remote target on an available authentication protocol. Nessus was able to connect to the remote
port and identify that the service running on the port supports an authentication protocol, but Nessus failed to authenticate to the remote service using the
provided credentials. There may have been a protocol failure that prevented authentication from being attempted or all of the provided credentials for the

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 204/210
12/13/24, 4:22 PM AD1

authentication protocol may be invalid. See plugin output for error details.

Please note the following :

- This plugin reports per protocol, so it is possible for valid credentials to be provided for one protocol and not another. For example, authentication may succeed
via SSH but fail via SMB, while no credentials were provided for an available SNMP service.

- Providing valid credentials for all available authentication protocols may improve scan coverage, but the value of successful authentication for a given protocol
may vary from target to target depending upon what data (if any) is gathered from the target via that protocol. For example, successful authentication via SSH is
more valuable for Linux targets than for Windows targets, and likewise successful authentication via SMB is more valuable for Windows targets than for Linux
targets.

Solution
n/a

Risk Factor
None

References

XREF IAVB:0001-B-0504

Plugin Information
Published: 2018/06/27, Modified: 2024/04/19

Plugin Output
tcp/0

SMB was detected on port 445 but no credentials were provided.


SMB local checks were not enabled.

64814 - Terminal Services Use SSL/TLS -

Synopsis
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 205/210
12/13/24, 4:22 PM AD1

The remote Terminal Services use SSL/TLS.

Description
The remote Terminal Services is configured to use SSL/TLS.

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2013/02/22, Modified: 2023/07/10

Plugin Output
tcp/3389/msrdp

Subject Name:

Common Name: AD01.tayninh.dcs.vn

Issuer Name:

Common Name: AD01.tayninh.dcs.vn

Serial Number: 4E B3 6E BC 49 5D A9 95 4E 80 71 60 29 A2 B7 4F

Version: 3

Signature Algorithm: SHA-256 With RSA Encryption

Not Valid Before: Nov 10 07:01:22 2024 GMT


Not Valid After: May 12 07:01:22 2025 GMT

Public Key Info:

Algorithm: RSA Encryption


Key Length: 2048 bits
Public Key: 00 BC 2F 9B 32 E4 A4 B7 07 32 0A 6D 2F 0D 04 49 2B BD 4F 97
A3 5B 43 CB F6 00 A3 80 B5 A3 FC 22 D7 CA 9E F4 FD 3A F7 7D
30 CF E2 CE 9E D7 DD 55 93 9C 8E A7 69 66 86 7D 84 E8 C6 A0
94 D5 9E 97 AF 9E 7B F8 CF 77 D3 8B BE C9 9A 28 C3 7A 06 20
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 206/210
12/13/24, 4:22 PM AD1
35 89 97 9F 66 BD 5E AE 49 B8 EA 50 CE 1F 29 82 68 A8 C9 8A
58 80 A8 98 12 65 5D E5 AB 7A 45 67 9B 95 43 F0 E0 38 15 8E
A3 86 E4 A4 F7 72 31 E4 9A 37 67 B5 F2 6C AD A8 43 A2 D2 50
E1 E4 D3 CD B5 B3 4E 7A 35 30 36 7F 93 82 97 EA 54 86 80 AF
9E FA F2 32 39 58 97 80 6D F6 C9 01 7E 97 EF 15 F2 E5 71 3C
A9 6C C5 7A 3C 6E 93 E8 E8 83 F9 EC 4D D9 B7 7B 35 C8 26 F0
5F 78 67 50 F9 76 DE 1F B5 F1 B1 8A 68 70 AF 86 CE 1B DE 97
B8 7C 7A FD F3 E3 A5 D1 AD 7C 7F 7C 6E 39 45 F7 C9 17 7A DA
63 83 2B 5F A4 C5 8E C2 A5 1E 15 2A C8 83 75 9E 89
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits


Signature: 00 89 5C 5F D4 6A 98 DD 33 64 6C B0 97 BD 9B 63 72 AD 4D C9
D3 A8 11 AE F2 39 A6 CE AF 21 6E 99 DB 1B 23 09 96 30 C9 08
FA 81 1D 8A 16 43 16 EA D3 20 30 66 59 AA 85 A4 4C 0E B5 94
DD 88 D1 31 83 72 A0 F4 5A 82 71 C6 A0 FA DB C7 A6 58 1E 72
52 A7 E5 E8 7A C9 54 8C 75 33 8E D6 41 09 42 4C 9E 96 E1 08
6B D5 8A D5 5D 13 8F 0E 1C C0 4D BF B3 36 D9 5A B3 B7 5C A1
BD FD D0 BD 66 FB CE 57 08 9A CE CC E1 5F 80 36 37 FD 85 35
9D 65 C1 6F 7D 08 FF 5B F9 4E 86 F4 B2 4C 50 E9 BB 63 BE 2B
87 80 34 48 14 F0 9B E5 79 82 97 58 5C 8B 56 9D A2 A9 82 C8
B6 3F ED 7C 5D 39 DC 21 87 B1 20 26 33 6A 7E E2 E5 7F 55 85
0A 35 F1 9C 72 0B E2 58 10 A2 2F AF B9 CE 3F 35 C8 EC DE 85
DD A1 C5 86 FF 63 52 BE A2 35 4F 7A BF F3 6C 8D 8E 40 57 E7
62 5F 66 01 10 E0 4F DA 3F 62 75 4A C2 14 9F 7C 69

Extension: Extended Key Usage (2.5.29.37)


Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)

Extension: Key Usage (2.5.29.15)


Critical: 0
Key Usage: Key Encipherment, Data Encipherment

135860 - WMI Not Available -

Synopsis
WMI queries could not be made against the remote host.

Description
WMI (Windows Management Instrumentation) is not available on the remote host over DCOM. WMI queries are used to gather information about the remote host,
such as its current state, network interface configuration, etc.
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 207/210
12/13/24, 4:22 PM AD1

Without this information Nessus may not be able to identify installed software or security vunerabilities that exist on the remote host.

See Also

https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmi-start-page

Solution
n/a

Risk Factor
None

Plugin Information
Published: 2020/04/21, Modified: 2024/11/22

Plugin Output
tcp/445/cifs

Can't connect to the 'root\CIMV2' WMI namespace.

33139 - WS-Management Server Detection -

Synopsis
The remote web server is used for remote management.

Description
The remote web server supports the Web Services for Management (WS-Management) specification, a general web services protocol based on SOAP for managing
systems, applications, and other such entities.

See Also

https://www.dmtf.org/standards/ws-man
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 208/210
12/13/24, 4:22 PM AD1

https://en.wikipedia.org/wiki/WS-Management

Solution
Limit incoming traffic to this port if desired.

Risk Factor
None

Plugin Information
Published: 2008/06/11, Modified: 2021/05/19

Plugin Output
tcp/5985/www

Here is some information about the WS-Management Server :

Product Vendor : Microsoft Corporation


Product Version : OS: 0.0.0 SP: 0.0 Stack: 3.0

10150 - Windows NetBIOS / SMB Remote Host Information Disclosure -

Synopsis
It was possible to obtain the network name of the remote host.

Description
The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.

Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.

Solution
n/a

Risk Factor
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 209/210
12/13/24, 4:22 PM AD1

None

Plugin Information
Published: 1999/10/12, Modified: 2021/02/10

Plugin Output
tcp/445/cifs

The following 2 NetBIOS names have been gathered :

AD01 = Computer name


TAYNINH = Workgroup / Domain name

© 2024 Tenable™, Inc. All rights reserved.

file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 210/210

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy