volatility3
volatility3 copied to clipboard
windows.netscan, windows.netstat
I have been trying to use windows.netscan and windows.netstat but doesn't exist in volatility 3
Sorry, that's an extremely short description to try and diagnose the problem from? Could you please provide the requested information (notably, the command line you used to run the commands, and the output you got from the commands, when running with at least vol.py -vvv).
@Deathkon it does exist, i think you should pull latest develop branch. I have tested both. Netstat worked fine
Netscan sometimes failed or took time, depending the image/os version:

Interesting... I ran netscan with vol2 and netsat with vol3 and vol3 doesn't show the ESTABLISHED connections.
Sounds like one that @japhlange might know more about?
@wilsq36 Can you provide more information about the memory image you are looking at?
It is possible that newer Windows versions may have changed their offsets again.
Hi,
It is somewhat related to this question. When I run the netstat plugin on new versions of Windows (10, 11 and server 2022). It seems like the netstat plugin does not always display the process. Is this normal?
As an example, in the output of netstat listed below, the first connection should be by process rmet.exe (PID 7872) but the process name and PID is now shown.
I have ran the same command again with debug so that you can see that volatility3.framework.symbols.windows.pdbutil previously downloaded tcpip.pdb D17014EA1A4CFE34C871090246252BF7-1 and is using it now. But, I also see that:
DEBUG volatility3.plugins.windows.netscan: Unable to find exact matching symbol file, going with latest: netscan-win10-19041-x64
DEBUG volatility3.plugins.windows.netscan: Determined symbol filename: netscan-win10-19041-x64
Is this why the plugin is not able to print the process PIDs and name. Is there a ways to obtain newer json for netscan/netstat? Thank you for your help.
$ vol -f web.vmem windows.netstat
Volatility 3 Framework 2.2.0
Progress: 100.00 PDB scanning finished
Offset Proto LocalAddr LocalPort ForeignAddr ForeignPort State PID Owner Created
0xde0df6ef29a0 TCPv4 10.10.1.3 49990 14.16.2.36 31337 ESTABLISHED - - N/A
0xde0df685a260 TCPv4 10.10.1.3 50040 23.78.75.237 443 ESTABLISHED - - N/A
0xde0df12c1cb0 TCPv4 0.0.0.0 80 0.0.0.0 0 LISTENING 4 System 2022-07-06 16:06:49.000000
0xde0df12c1cb0 TCPv6 :: 80 :: 0 LISTENING 4 System 2022-07-06 16:06:49.000000
0xde0df37f8230 TCPv4 0.0.0.0 135 0.0.0.0 0 LISTENING 1000 svchost.exe 2022-07-06 16:06:46.000000
0xde0df37f8230 TCPv6 :: 135 :: 0 LISTENING 1000 svchost.exe 2022-07-06 16:06:46.000000
0xde0df3efe730 TCPv4 0.0.0.0 135 0.0.0.0 0 LISTENING 1000 svchost.exe 2022-07-06 16:06:46.000000
0xde0df509f7b0 TCPv4 10.10.1.3 139 0.0.0.0 0 LISTENING 4 System 2022-07-06 16:06:48.000000
0xde0df12c19f0 TCPv4 0.0.0.0 445 0.0.0.0 0 LISTENING 4 System 2022-07-06 16:06:49.000000
0xde0df12c19f0 TCPv6 :: 445 :: 0 LISTENING 4 System 2022-07-06 16:06:49.000000
0xde0df509f390 TCPv4 0.0.0.0 5357 0.0.0.0 0 LISTENING 4 System 2022-07-06 16:06:50.000000
0xde0df509f390 TCPv6 :: 5357 :: 0 LISTENING 4 System 2022-07-06 16:06:50.000000
0xde0df509f230 TCPv4 0.0.0.0 5985 0.0.0.0 0 LISTENING 4 System 2022-07-06 16:06:50.000000
0xde0df509f230 TCPv6 :: 5985 :: 0 LISTENING 4 System 2022-07-06 16:06:50.000000
0xde0df509fa70 TCPv4 0.0.0.0 47001 0.0.0.0 0 LISTENING 4 System 2022-07-06 16:06:49.000000
0xde0df509fa70 TCPv6 :: 47001 :: 0 LISTENING 4 System 2022-07-06 16:06:49.000000
0xde0df3efe5d0 TCPv4 0.0.0.0 49664 0.0.0.0 0 LISTENING 812 lsass.exe 2022-07-06 16:06:46.000000
0xde0df3efe5d0 TCPv6 :: 49664 :: 0 LISTENING 812 lsass.exe 2022-07-06 16:06:46.000000
0xde0df3efe470 TCPv4 0.0.0.0 49664 0.0.0.0 0 LISTENING 812 lsass.exe 2022-07-06 16:06:46.000000
0xde0df3eff650 TCPv4 0.0.0.0 49665 0.0.0.0 0 LISTENING 696 wininit.exe 2022-07-06 16:06:46.000000
0xde0df3eff650 TCPv6 :: 49665 :: 0 LISTENING 696 wininit.exe 2022-07-06 16:06:46.000000
0xde0df3eff4f0 TCPv4 0.0.0.0 49665 0.0.0.0 0 LISTENING 696 wininit.exe 2022-07-06 16:06:46.000000
0xde0df3eff7b0 TCPv4 0.0.0.0 49666 0.0.0.0 0 LISTENING 1272 svchost.exe 2022-07-06 16:06:47.000000
0xde0df3eff7b0 TCPv6 :: 49666 :: 0 LISTENING 1272 svchost.exe 2022-07-06 16:06:47.000000
0xde0df3efee10 TCPv4 0.0.0.0 49666 0.0.0.0 0 LISTENING 1272 svchost.exe 2022-07-06 16:06:47.000000
0xde0df509fd30 TCPv4 0.0.0.0 49667 0.0.0.0 0 LISTENING 1624 svchost.exe 2022-07-06 16:06:47.000000
0xde0df509fd30 TCPv6 :: 49667 :: 0 LISTENING 1624 svchost.exe 2022-07-06 16:06:47.000000
0xde0df509e1b0 TCPv4 0.0.0.0 49667 0.0.0.0 0 LISTENING 1624 svchost.exe 2022-07-06 16:06:47.000000
0xde0df509ee10 TCPv4 0.0.0.0 49668 0.0.0.0 0 LISTENING 1440 spoolsv.exe 2022-07-06 16:06:47.000000
0xde0df509ee10 TCPv6 :: 49668 :: 0 LISTENING 1440 spoolsv.exe 2022-07-06 16:06:47.000000
0xde0df509f650 TCPv4 0.0.0.0 49668 0.0.0.0 0 LISTENING 1440 spoolsv.exe 2022-07-06 16:06:47.000000
0xde0df509e730 TCPv4 0.0.0.0 49669 0.0.0.0 0 LISTENING 804 services.exe 2022-07-06 16:06:49.000000
0xde0df509e730 TCPv6 :: 49669 :: 0 LISTENING 804 services.exe 2022-07-06 16:06:49.000000
0xde0df509f4f0 TCPv4 0.0.0.0 49669 0.0.0.0 0 LISTENING 804 services.exe 2022-07-06 16:06:49.000000
0xde0df548bce0 UDPv4 10.10.1.3 137 * 0 4 System 2022-07-06 16:06:48.000000
0xde0df548c320 UDPv4 10.10.1.3 138 * 0 4 System 2022-07-06 16:06:48.000000
0xde0df5291e70 UDPv4 0.0.0.0 500 * 0 2084 svchost.exe 2022-07-06 16:06:48.000000
0xde0df5291e70 UDPv6 :: 500 * 0 2084 svchost.exe 2022-07-06 16:06:48.000000
0xde0df52927d0 UDPv4 0.0.0.0 500 * 0 2084 svchost.exe 2022-07-06 16:06:48.000000
0xde0df5a0d620 UDPv4 0.0.0.0 3702 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000
0xde0df5a0d620 UDPv6 :: 3702 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000
0xde0df5a0c810 UDPv4 0.0.0.0 3702 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000
0xde0df5a0c810 UDPv6 :: 3702 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000
0xde0df5a08800 UDPv4 0.0.0.0 3702 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000
0xde0df5a0bd20 UDPv4 0.0.0.0 3702 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000
0xde0df52916a0 UDPv4 0.0.0.0 4500 * 0 2084 svchost.exe 2022-07-06 16:06:48.000000
0xde0df52916a0 UDPv6 :: 4500 * 0 2084 svchost.exe 2022-07-06 16:06:48.000000
0xde0df5292320 UDPv4 0.0.0.0 4500 * 0 2084 svchost.exe 2022-07-06 16:06:48.000000
0xde0df51b1990 UDPv4 0.0.0.0 5353 * 0 1644 svchost.exe 2022-07-06 16:06:48.000000
0xde0df51b1990 UDPv6 :: 5353 * 0 1644 svchost.exe 2022-07-06 16:06:48.000000
0xde0df51b0860 UDPv4 0.0.0.0 5353 * 0 1644 svchost.exe 2022-07-06 16:06:48.000000
0xde0df6e94d00 UDPv4 0.0.0.0 5353 * 0 5636 msedge.exe 2022-07-06 16:07:39.000000
0xde0df73226a0 UDPv4 0.0.0.0 5353 * 0 5948 msedge.exe 2022-07-06 16:08:00.000000
0xde0df6e97280 UDPv4 0.0.0.0 5353 * 0 5636 msedge.exe 2022-07-06 16:07:39.000000
0xde0df6e97280 UDPv6 :: 5353 * 0 5636 msedge.exe 2022-07-06 16:07:39.000000
0xde0df7323c80 UDPv4 0.0.0.0 5353 * 0 5948 msedge.exe 2022-07-06 16:08:00.000000
0xde0df7323c80 UDPv6 :: 5353 * 0 5948 msedge.exe 2022-07-06 16:08:00.000000
0xde0df548c960 UDPv4 0.0.0.0 5355 * 0 1644 svchost.exe 2022-07-06 16:06:48.000000
0xde0df548c960 UDPv6 :: 5355 * 0 1644 svchost.exe 2022-07-06 16:06:48.000000
0xde0df548da90 UDPv4 0.0.0.0 5355 * 0 1644 svchost.exe 2022-07-06 16:06:48.000000
0xde0df6b697e0 UDPv4 0.0.0.0 49943 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000
0xde0df6b697e0 UDPv6 :: 49943 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000
0xde0df5a0d170 UDPv4 0.0.0.0 50201 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000
0xde0df5a0c680 UDPv4 0.0.0.0 50202 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000
0xde0df5a0c680 UDPv6 :: 50202 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000
0xde0df6b6a780 UDPv4 0.0.0.0 50341 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000
0xde0df6b6a780 UDPv6 :: 50341 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000
0xde0df6b6c210 UDPv4 0.0.0.0 50607 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000
0xde0df6b6c210 UDPv6 :: 50607 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000
0xde0df5694a60 UDPv4 127.0.0.1 57616 * 0 2104 svchost.exe 2022-07-06 16:06:49.000000
0xde0df6b6b720 UDPv4 0.0.0.0 63208 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000
0xde0df6b6b720 UDPv6 :: 63208 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000
0xde0df607ec80 UDPv4 0.0.0.0 64106 * 0 5948 msedge.exe 2022-07-06 16:08:01.000000
0xde0df608ecc0 UDPv4 0.0.0.0 64107 * 0 5948 msedge.exe 2022-07-06 16:08:01.000000
0xde0df608ecc0 UDPv6 :: 64107 * 0 5948 msedge.exe 2022-07-06 16:08:01.000000
0xde0df5c879c0 UDPv4 0.0.0.0 64181 * 0 1644 svchost.exe 2022-07-06 16:06:54.000000
0xde0df5c879c0 UDPv6 :: 64181 * 0 1644 svchost.exe 2022-07-06 16:06:54.000000
This is with verbose:
$ vol -vvv -f web.vmem windows.netstat
Volatility 3 Framework 2.2.0
INFO volatility3.cli: Volatility plugins path: ['/usr/local/lib/python3.10/dist-packages/volatility3/plugins', '/usr/local/lib/python3.10/dist-packages/volatility3/framework/plugins']
INFO volatility3.cli: Volatility symbols path: ['/usr/local/lib/python3.10/dist-packages/volatility3/symbols', '/usr/local/lib/python3.10/dist-packages/volatility3/framework/symbols']
INFO volatility3.framework.automagic: Detected a windows category plugin
INFO volatility3.framework.automagic: Running automagic: ConstructionMagic
Level 9 volatility3.framework.configuration.requirements: IndexError - No configuration provided: plugins.NetStat.kernel.layer_name
Level 9 volatility3.framework.configuration.requirements: Symbol table requirement not yet fulfilled: plugins.NetStat.kernel.symbol_table_name
Level 9 volatility3.framework.configuration.requirements: IndexError - No configuration provided: plugins.NetStat.kernel.layer_name
Level 9 volatility3.framework.configuration.requirements: Symbol table requirement not yet fulfilled: plugins.NetStat.kernel.symbol_table_name
Level 9 volatility3.framework.automagic.construct_layers: Failed on requirement: plugins.NetStat.kernel
Level 9 volatility3.framework.configuration.requirements: IndexError - No configuration provided: plugins.NetStat.kernel.layer_name
Level 9 volatility3.framework.automagic.construct_layers: Failed on requirement: plugins.NetStat.kernel.layer_name
Level 9 volatility3.framework.configuration.requirements: IndexError - No configuration provided: plugins.NetStat.kernel.layer_name
Level 9 volatility3.framework.automagic.construct_layers: Failed on requirement: plugins.NetStat.kernel
Level 9 volatility3.framework.configuration.requirements: Symbol table requirement not yet fulfilled: plugins.NetStat.kernel.symbol_table_name
Level 9 volatility3.framework.automagic.construct_layers: Failed on requirement: plugins.NetStat.kernel.symbol_table_name
Level 9 volatility3.framework.configuration.requirements: Symbol table requirement not yet fulfilled: plugins.NetStat.kernel.symbol_table_name
Level 9 volatility3.framework.automagic.construct_layers: Failed on requirement: plugins.NetStat.kernel
Level 9 volatility3.framework.configuration.requirements: IndexError - No configuration provided: plugins.NetStat.kernel.layer_name
Level 9 volatility3.framework.configuration.requirements: Symbol table requirement not yet fulfilled: plugins.NetStat.kernel.symbol_table_name
Level 9 volatility3.framework.automagic.construct_layers: Failed on requirement: plugins.NetStat
INFO volatility3.framework.automagic: Running automagic: SymbolBannerCache
INFO volatility3.framework.automagic: Running automagic: LayerStacker
Level 9 volatility3.framework.configuration.requirements: IndexError - No configuration provided: plugins.NetStat.kernel.layer_name
Level 9 volatility3.framework.configuration.requirements: Symbol table requirement not yet fulfilled: plugins.NetStat.kernel.symbol_table_name
DEBUG volatility3.framework.automagic.windows: Detecting Self-referential pointer for recent windows
DEBUG volatility3.framework.automagic.windows: DtbSelfRef64bit test succeeded at 0x1ae000
DEBUG volatility3.framework.automagic.windows: DTB was found at: 0x1ae000
Level 9 volatility3.framework.configuration.requirements: IndexError - No configuration provided: plugins.NetStat.kernel.layer_name
Level 9 volatility3.framework.configuration.requirements: IndexError - No configuration provided: plugins.NetStat.kernel.layer_name
Level 9 volatility3.framework.configuration.requirements: Symbol table requirement not yet fulfilled: plugins.NetStat.kernel.symbol_table_name
Level 9 volatility3.framework.configuration.requirements: IndexError - No configuration provided: plugins.NetStat.kernel.layer_name
Level 9 volatility3.framework.configuration.requirements: Symbol table requirement not yet fulfilled: plugins.NetStat.kernel.symbol_table_name
Level 9 volatility3.framework.automagic.construct_layers: Failed on requirement: plugins.NetStat.kernel
Level 9 volatility3.framework.configuration.requirements: IndexError - No configuration provided: plugins.NetStat.kernel.layer_name
Level 9 volatility3.framework.configuration.requirements: IndexError - No configuration provided: plugins.NetStat.kernel.layer_name.memory_layer
Level 9 volatility3.framework.configuration.requirements: IndexError - No configuration provided: plugins.NetStat.kernel.layer_name.memory_layer.base_layer
Level 9 volatility3.framework.configuration.requirements: IndexError - No configuration provided: plugins.NetStat.kernel.layer_name.memory_layer.meta_layer
Level 9 volatility3.framework.interfaces.configuration: TypeError - kernel_virtual_offset requirements only accept int type: None
Level 9 volatility3.framework.interfaces.configuration: TypeError - kernel_virtual_offset requirements only accept int type: None
Level 9 volatility3.framework.interfaces.configuration: TypeError - kernel_banner requirements only accept str type: None
Level 9 volatility3.framework.interfaces.configuration: TypeError - kernel_banner requirements only accept str type: None
Level 9 volatility3.framework.configuration.requirements: Symbol table requirement not yet fulfilled: plugins.NetStat.kernel.symbol_table_name
Level 9 volatility3.framework.automagic.construct_layers: Failed on requirement: plugins.NetStat.kernel.symbol_table_name
Level 9 volatility3.framework.configuration.requirements: Symbol table requirement not yet fulfilled: plugins.NetStat.kernel.symbol_table_name
Level 9 volatility3.framework.automagic.construct_layers: Failed on requirement: plugins.NetStat.kernel
Level 9 volatility3.framework.configuration.requirements: Symbol table requirement not yet fulfilled: plugins.NetStat.kernel.symbol_table_name
Level 9 volatility3.framework.automagic.construct_layers: Failed on requirement: plugins.NetStat
DEBUG volatility3.framework.automagic.stacker: Stacked layers: ['IntelLayer', 'VmwareLayer', 'FileLayer']
INFO volatility3.framework.automagic: Running automagic: WinSwapLayers
INFO volatility3.framework.automagic: Running automagic: KernelPDBScanner
Level 9 volatility3.framework.configuration.requirements: Symbol table requirement not yet fulfilled: plugins.NetStat.kernel.symbol_table_name
Level 9 volatility3.framework.configuration.requirements: Symbol table requirement not yet fulfilled: plugins.NetStat.kernel.symbol_table_name
Level 9 volatility3.framework.configuration.requirements: Symbol table requirement not yet fulfilled: plugins.NetStat.kernel.symbol_table_name
DEBUG volatility3.framework.automagic.pdbscan: Kernel base determination - searching layer module list structure
DEBUG volatility3.framework.automagic.pdbscan: Kernel base determination - searching layer module list structure
DEBUG volatility3.framework.automagic.pdbscan: Kernel base determination - testing fixed base address
DEBUG volatility3.framework.automagic.pdbscan: Potential kernel_virtual_offset caused a page fault: 0xf80100400000
DEBUG volatility3.framework.automagic.pdbscan: Kernel base determination - optimized scan virtual layer
DEBUG volatility3.framework.automagic.pdbscan: Setting kernel_virtual_offset to 0xf8024e200000
DEBUG volatility3.framework.symbols.windows.pdbutil: Using symbol library: ntkrnlmp.pdb/21E85D1745416FB7ACF01CF90A132AAB-1
INFO volatility3.schemas: Dependency for validation unavailable: jsonschema
DEBUG volatility3.schemas: All validations will report success, even with malformed input
INFO volatility3.framework.automagic: Running automagic: SymbolFinder
INFO volatility3.framework.automagic: Running automagic: KernelModule
Offset Proto LocalAddr LocalPort ForeignAddr ForeignPort State PID Owner Created
DEBUG volatility3.plugins.windows.netscan: Determined OS Version: 10.0 15.20348
DEBUG volatility3.plugins.windows.netscan: Unable to find exact matching symbol file, going with latest: netscan-win10-19041-x64
DEBUG volatility3.plugins.windows.netscan: Determined symbol filename: netscan-win10-19041-x64
INFO volatility3.schemas: Dependency for validation unavailable: jsonschema
DEBUG volatility3.schemas: All validations will report success, even with malformed input
DEBUG volatility3.plugins.windows.netstat: Found tcpip.sys image base @ 0xf80251cf0000
DEBUG volatility3.framework.symbols.windows.pdbutil: Found tcpip.pdb: D17014EA1A4CFE34C871090246252BF7-1
DEBUG volatility3.framework.symbols.windows.pdbutil: Using symbol library: tcpip.pdb/D17014EA1A4CFE34C871090246252BF7-1
INFO volatility3.schemas: Dependency for validation unavailable: jsonschema
DEBUG volatility3.schemas: All validations will report success, even with malformed input
DEBUG volatility3.plugins.windows.netstat: Found TCP connection PartitionTable @ 0xde0df3235000 (partition count: 1)
DEBUG volatility3.framework.symbols: Unresolved reference: netscan-win10-19041-x641!__unnamed_2
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_PO_PROCESS_ENERGY_CONTEXT
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_EPROCESS_QUOTA_BLOCK
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_PS_SYSCALL_PROVIDER
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_PAGEFAULT_HISTORY
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_JOB_ACCESS_STATE
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_JOB_CPU_RATE_CONTROL
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_JOB_NET_RATE_CONTROL
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_JOB_NOTIFICATION_INFORMATION
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_PSP_STORAGE
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_ACTIVATION_CONTEXT_DATA
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_CHPEV2_PROCESS_INFO
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_ASSEMBLY_STORAGE_MAP
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_EXP_LICENSE_STATE
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_NLS_STATE
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_DBGKP_ERROR_PORT
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_CI_NGEN_PATHS
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_EX_WNF_SUBSCRIPTION
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_ETW_EVENT_CALLBACK_CONTEXT
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_ETW_SOFT_RESTART_CONTEXT
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_ETW_STACK_CACHE
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_ETW_PERFECT_HASH_FUNCTION
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_EX_TIMER
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_HAL_PMC_COUNTERS
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_DEVICE_NODE_IOMMU_EXTENSION
DEBUG volatility3.framework.symbols: Unresolved reference: symbol_table_name1!_SCSI_REQUEST_BLOCK
DEBUG volatility3.plugins.windows.netstat: Parsing partition 0
DEBUG volatility3.plugins.windows.netstat: Found _TCP_ENDPOINT @ 0xde0df6ef29a0
0xde0df6ef29a0 TCPv4 10.10.1.3 49990 14.16.2.36 31337 ESTABLISHED - - N/ADEBUG volatility3.plugins.windows.netstat: Found _TCP_ENDPOINT @ 0xde0df685a260
0xde0df685a260 TCPv4 10.10.1.3 50040 23.78.75.237 443 ESTABLISHED - - N/ADEBUG volatility3.plugins.windows.netstat: Found PortPools @ 0xde0df36bd000 (UDP) && 0xde0df36c0000 (TCP)
DEBUG volatility3.plugins.windows.netstat: Found TCP Ports: [0, 80, 135, 139, 445, 5357, 5985, 47001, 49664, 49665, 49666, 49667, 49668, 49669, 49990, 50040]
DEBUG volatility3.plugins.windows.netstat: Found UDP Ports: [0, 137, 138, 500, 3702, 4500, 5353, 5355, 49943, 50201, 50202, 50341, 50607, 57616, 63208, 64106, 64107, 64181]
DEBUG volatility3.plugins.windows.netstat: Current Port: 80
DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df12c1cb0
0xde0df12c1cb0 TCPv4 0.0.0.0 80 0.0.0.0 0 LISTENING 4 System 2022-07-06 16:06:49.000000
0xde0df12c1cb0 TCPv6 :: 80 :: 0 LISTENING 4 System 2022-07-06 16:06:49.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 135
DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df37f8230
0xde0df37f8230 TCPv4 0.0.0.0 135 0.0.0.0 0 LISTENING 1000 svchost.exe 2022-07-06 16:06:46.000000
0xde0df37f8230 TCPv6 :: 135 :: 0 LISTENING 1000 svchost.exe 2022-07-06 16:06:46.000000 DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df3efe730
0xde0df3efe730 TCPv4 0.0.0.0 135 0.0.0.0 0 LISTENING 1000 svchost.exe 2022-07-06 16:06:46.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 139
DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df509f7b0
0xde0df509f7b0 TCPv4 10.10.1.3 139 0.0.0.0 0 LISTENING 4 System 2022-07-06 16:06:48.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 445
DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df12c19f0
0xde0df12c19f0 TCPv4 0.0.0.0 445 0.0.0.0 0 LISTENING 4 System 2022-07-06 16:06:49.000000
0xde0df12c19f0 TCPv6 :: 445 :: 0 LISTENING 4 System 2022-07-06 16:06:49.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 5357
DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df509f390
0xde0df509f390 TCPv4 0.0.0.0 5357 0.0.0.0 0 LISTENING 4 System 2022-07-06 16:06:50.000000
0xde0df509f390 TCPv6 :: 5357 :: 0 LISTENING 4 System 2022-07-06 16:06:50.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 5985
DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df509f230
0xde0df509f230 TCPv4 0.0.0.0 5985 0.0.0.0 0 LISTENING 4 System 2022-07-06 16:06:50.000000
0xde0df509f230 TCPv6 :: 5985 :: 0 LISTENING 4 System 2022-07-06 16:06:50.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 47001
DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df509fa70
0xde0df509fa70 TCPv4 0.0.0.0 47001 0.0.0.0 0 LISTENING 4 System 2022-07-06 16:06:49.000000
0xde0df509fa70 TCPv6 :: 47001 :: 0 LISTENING 4 System 2022-07-06 16:06:49.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 49664
DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df3efe5d0
0xde0df3efe5d0 TCPv4 0.0.0.0 49664 0.0.0.0 0 LISTENING 812 lsass.exe 2022-07-06 16:06:46.000000
0xde0df3efe5d0 TCPv6 :: 49664 :: 0 LISTENING 812 lsass.exe 2022-07-06 16:06:46.000000 DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df3efe470
0xde0df3efe470 TCPv4 0.0.0.0 49664 0.0.0.0 0 LISTENING 812 lsass.exe 2022-07-06 16:06:46.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 49665
DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df3eff650
0xde0df3eff650 TCPv4 0.0.0.0 49665 0.0.0.0 0 LISTENING 696 wininit.exe 2022-07-06 16:06:46.000000
0xde0df3eff650 TCPv6 :: 49665 :: 0 LISTENING 696 wininit.exe 2022-07-06 16:06:46.000000 DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df3eff4f0
0xde0df3eff4f0 TCPv4 0.0.0.0 49665 0.0.0.0 0 LISTENING 696 wininit.exe 2022-07-06 16:06:46.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 49666
DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df3eff7b0
0xde0df3eff7b0 TCPv4 0.0.0.0 49666 0.0.0.0 0 LISTENING 1272 svchost.exe 2022-07-06 16:06:47.000000
0xde0df3eff7b0 TCPv6 :: 49666 :: 0 LISTENING 1272 svchost.exe 2022-07-06 16:06:47.000000 DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df3efee10
0xde0df3efee10 TCPv4 0.0.0.0 49666 0.0.0.0 0 LISTENING 1272 svchost.exe 2022-07-06 16:06:47.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 49667
DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df509fd30
0xde0df509fd30 TCPv4 0.0.0.0 49667 0.0.0.0 0 LISTENING 1624 svchost.exe 2022-07-06 16:06:47.000000
0xde0df509fd30 TCPv6 :: 49667 :: 0 LISTENING 1624 svchost.exe 2022-07-06 16:06:47.000000 DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df509e1b0
0xde0df509e1b0 TCPv4 0.0.0.0 49667 0.0.0.0 0 LISTENING 1624 svchost.exe 2022-07-06 16:06:47.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 49668
DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df509ee10
0xde0df509ee10 TCPv4 0.0.0.0 49668 0.0.0.0 0 LISTENING 1440 spoolsv.exe 2022-07-06 16:06:47.000000
0xde0df509ee10 TCPv6 :: 49668 :: 0 LISTENING 1440 spoolsv.exe 2022-07-06 16:06:47.000000 DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df509f650
0xde0df509f650 TCPv4 0.0.0.0 49668 0.0.0.0 0 LISTENING 1440 spoolsv.exe 2022-07-06 16:06:47.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 49669
DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df509e730
0xde0df509e730 TCPv4 0.0.0.0 49669 0.0.0.0 0 LISTENING 804 services.exe 2022-07-06 16:06:49.000000
0xde0df509e730 TCPv6 :: 49669 :: 0 LISTENING 804 services.exe 2022-07-06 16:06:49.000000 DEBUG volatility3.plugins.windows.netstat: Found _TCP_LISTENER @ 0xde0df509f4f0
0xde0df509f4f0 TCPv4 0.0.0.0 49669 0.0.0.0 0 LISTENING 804 services.exe 2022-07-06 16:06:49.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 49990
DEBUG volatility3.framework.symbols.windows.extensions.network: netw obj 0xde0df6d2d248 invalid due to invalid address_family 24728
DEBUG volatility3.plugins.windows.netstat: Current Port: 50040
DEBUG volatility3.framework.symbols.windows.extensions.network: netw obj 0xde0df6d40d48 invalid due to invalid address_family 12440
DEBUG volatility3.plugins.windows.netstat: Current Port: 137
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df548bce0
0xde0df548bce0 UDPv4 10.10.1.3 137 * 0 4 System 2022-07-06 16:06:48.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 138
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df548c320
0xde0df548c320 UDPv4 10.10.1.3 138 * 0 4 System 2022-07-06 16:06:48.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 500
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df5291e70
0xde0df5291e70 UDPv4 0.0.0.0 500 * 0 2084 svchost.exe 2022-07-06 16:06:48.000000
0xde0df5291e70 UDPv6 :: 500 * 0 2084 svchost.exe 2022-07-06 16:06:48.000000 DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df52927d0
0xde0df52927d0 UDPv4 0.0.0.0 500 * 0 2084 svchost.exe 2022-07-06 16:06:48.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 3702
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df5a0d620
0xde0df5a0d620 UDPv4 0.0.0.0 3702 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000
0xde0df5a0d620 UDPv6 :: 3702 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000 DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df5a0c810
0xde0df5a0c810 UDPv4 0.0.0.0 3702 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000
0xde0df5a0c810 UDPv6 :: 3702 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000 DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df5a08800
0xde0df5a08800 UDPv4 0.0.0.0 3702 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000 DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df5a0bd20
0xde0df5a0bd20 UDPv4 0.0.0.0 3702 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 4500
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df52916a0
0xde0df52916a0 UDPv4 0.0.0.0 4500 * 0 2084 svchost.exe 2022-07-06 16:06:48.000000
0xde0df52916a0 UDPv6 :: 4500 * 0 2084 svchost.exe 2022-07-06 16:06:48.000000 DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df5292320
0xde0df5292320 UDPv4 0.0.0.0 4500 * 0 2084 svchost.exe 2022-07-06 16:06:48.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 5353
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df51b1990
0xde0df51b1990 UDPv4 0.0.0.0 5353 * 0 1644 svchost.exe 2022-07-06 16:06:48.000000
0xde0df51b1990 UDPv6 :: 5353 * 0 1644 svchost.exe 2022-07-06 16:06:48.000000 DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df51b0860
0xde0df51b0860 UDPv4 0.0.0.0 5353 * 0 1644 svchost.exe 2022-07-06 16:06:48.000000 DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df6e94d00
0xde0df6e94d00 UDPv4 0.0.0.0 5353 * 0 5636 msedge.exe 2022-07-06 16:07:39.000000 DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df73226a0
0xde0df73226a0 UDPv4 0.0.0.0 5353 * 0 5948 msedge.exe 2022-07-06 16:08:00.000000 DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df6e97280
0xde0df6e97280 UDPv4 0.0.0.0 5353 * 0 5636 msedge.exe 2022-07-06 16:07:39.000000
0xde0df6e97280 UDPv6 :: 5353 * 0 5636 msedge.exe 2022-07-06 16:07:39.000000 DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df7323c80
0xde0df7323c80 UDPv4 0.0.0.0 5353 * 0 5948 msedge.exe 2022-07-06 16:08:00.000000
0xde0df7323c80 UDPv6 :: 5353 * 0 5948 msedge.exe 2022-07-06 16:08:00.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 5355
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df548c960
0xde0df548c960 UDPv4 0.0.0.0 5355 * 0 1644 svchost.exe 2022-07-06 16:06:48.000000
0xde0df548c960 UDPv6 :: 5355 * 0 1644 svchost.exe 2022-07-06 16:06:48.000000 DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df548da90
0xde0df548da90 UDPv4 0.0.0.0 5355 * 0 1644 svchost.exe 2022-07-06 16:06:48.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 49943
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df6b697e0
0xde0df6b697e0 UDPv4 0.0.0.0 49943 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000
0xde0df6b697e0 UDPv6 :: 49943 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 50201
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df5a0d170
0xde0df5a0d170 UDPv4 0.0.0.0 50201 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 50202
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df5a0c680
0xde0df5a0c680 UDPv4 0.0.0.0 50202 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000
0xde0df5a0c680 UDPv6 :: 50202 * 0 3364 svchost.exe 2022-07-06 16:06:50.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 50341
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df6b6a780
0xde0df6b6a780 UDPv4 0.0.0.0 50341 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000
0xde0df6b6a780 UDPv6 :: 50341 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 50607
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df6b6c210
0xde0df6b6c210 UDPv4 0.0.0.0 50607 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000
0xde0df6b6c210 UDPv6 :: 50607 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 57616
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df5694a60
0xde0df5694a60 UDPv4 127.0.0.1 57616 * 0 2104 svchost.exe 2022-07-06 16:06:49.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 63208
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df6b6b720
0xde0df6b6b720 UDPv4 0.0.0.0 63208 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000
0xde0df6b6b720 UDPv6 :: 63208 * 0 1644 svchost.exe 2022-07-06 16:07:36.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 64106
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df607ec80
0xde0df607ec80 UDPv4 0.0.0.0 64106 * 0 5948 msedge.exe 2022-07-06 16:08:01.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 64107
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df608ecc0
0xde0df608ecc0 UDPv4 0.0.0.0 64107 * 0 5948 msedge.exe 2022-07-06 16:08:01.000000
0xde0df608ecc0 UDPv6 :: 64107 * 0 5948 msedge.exe 2022-07-06 16:08:01.000000 DEBUG volatility3.plugins.windows.netstat: Current Port: 64181
DEBUG volatility3.plugins.windows.netstat: Found UDP_ENDPOINT @ 0xde0df5c879c0
0xde0df5c879c0 UDPv4 0.0.0.0 64181 * 0 1644 svchost.exe 2022-07-06 16:06:54.000000
0xde0df5c879c0 UDPv6 :: 64181 * 0 1644 svchost.exe 2022-07-06 16:06:54.000000
For your info, this is the output of windows.info on my image. It is Windows Server 2022 21H2 20348.707
$ vol -f web.vmem windows.info
Volatility 3 Framework 2.2.0
Progress: 100.00 PDB scanning finished
Variable Value
Kernel Base 0xf8024e200000
DTB 0x1ae000
Symbols file:///usr/local/lib/python3.10/dist-packages/volatility3/symbols/windows/ntkrnlmp.pdb/21E85D1745416FB7ACF01CF90A132AAB-1.json.xz
Is64Bit True
IsPAE False
layer_name 0 WindowsIntel32e
memory_layer 1 VmwareLayer
base_layer 2 FileLayer
meta_layer 2 FileLayer
KdVersionBlock 0xf8024ee15508
Major/Minor 15.20348
MachineType 34404
KeNumberProcessors 1
SystemTime 2022-07-06 16:29:01
NtSystemRoot C:\Windows
NtProductType NtProductServer
NtMajorVersion 10
NtMinorVersion 0
PE MajorOperatingSystemVersion 10
PE MinorOperatingSystemVersion 0
PE Machine 34404
PE TimeDateStamp Thu Jun 18 06:34:27 2015
Thank you, Vincent
I searched more on the this forum and it seems like the problem is related to Volatility3 netstat/netscan not supporting the latest versions of Windows 10 and 11 yet. I would have to generate new .json files such as netscan-win10-19041-x64 which is the last available one that was developed. Is there a way to automatically build the .json files for the netscan/netstat plugins? @japhlange should know. Thank you.
Hello, @vincentroberge
That's right, if you don't have a Symbol Table (.json) that corresponds to the latest version, you'll get a hard-to-trust result. There are two main ways to create a Symbol Table that we can use.
One is to convert the PDB provided by the MS official server. However, this is only available for some kernel and driver files.
Files such as tcpip.sys, which are covered by the issue now, are not provided by MS, so unfortunately you have to use a different plan.
It's reverse engineering. In fact, we need to figure out what structures are constructed and used inside by direct analysis.
I think it would be possible to automate the binary structure that I know and the technology that is currently being studied. However, research and development have not yet been carried out enough to be used in volatility3.
For now, I think we should either analyze this directly, wait for it to be released on Microsoft, or look forward to community contributions.
This issue is stale because it has been open for 200 days with no activity.
Looks like netstat still doesn't work on windows 10/11
This issue is stale because it has been open for 200 days with no activity.