Hello,
You can verify if those redirections was used on your domain, and you can see where they redirect to thanks to those cmdlets :
(Get-ADObject -Identity (Get-ADRootDSE).defaultNamingContext -Properties wellKnownObjects).wellKnownObjects | ? {$_ -like "B:32:AA312825768811D1ADED00C04FD8D5CD:*"} #Computers
(Get-ADObject -Identity (Get-ADRootDSE).defaultNamingContext -Properties wellKnownObjects).wellKnownObjects | ? {$_ -like "B:32:A9D1CA15768811D1ADED00C04FD8D5CD:*"} #Users
If you want a more usable output :
(((Get-ADObject -Identity (Get-ADRootDSE).defaultNamingContext -Properties wellKnownObjects).wellKnownObjects | ? {$_ -like "B:32:AA312825768811D1ADED00C04FD8D5CD:*"}) -split ':')[3]#Computers
(((Get-ADObject -Identity (Get-ADRootDSE).defaultNamingContext -Properties wellKnownObjects).wellKnownObjects | ? {$_ -like "B:32:A9D1CA15768811D1ADED00C04FD8D5CD:*"}) -split ':')[3]#Users