Yeah most likely the tigger, sality, and black energy memory samples came from the same VM
that once had pid 1260 running. In other words, the baseline state for the VM once had
that process running, so every time we reverted the VM to install another malware sample,
the connection came back.
MHL
--------------------------------------------------
Michael Ligh (@iMHLv2)
GPG: 
http://mnin.org/gpg.pubkey.txt
Blog: 
http://volatility-labs.blogspot.com
Training: 
http://memoryanalysis.net
On Apr 6, 2014, at 2:21 PM, Andrew Case <atcuno(a)gmail.com> wrote:
  Hello,
 connscan performs scanning of physical memory to find connection
 structures. These structures can correspond to connections that
 previously closed, but whose structures have not yet been overwritten by
 a new connection.
 What you are seeing is that a process with PID 1260 performed some
 network activity and then later exited. The process structure (EPROCESS)
 related to the process was later overwritten while the connection
 structure was not.
 Thanks,
 Andrew (@attrc)
 On 3/27/2014 2:09 AM, Nouman Zia wrote:
  Hey,
        In images (tigger.vmem, sality.vmem and black energy) the
 connscan plugin gives an output which shows these images are making
 connection with some IP and also tells the PID of process which are
 making such connections but when I used PSLIST, PSSCAN and PSXVIEW
 plugins then none of them shows the process which is having such
 PID(which is making connection).
 P.S: In all the above mentioned images the process id is same i.e. PID=1260
 So the problem is why its not showing any detail about PID=1260???
 _______________________________________________
 Vol-users mailing list
 Vol-users(a)volatilityfoundation.org
 
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users
   _______________________________________________
 Vol-users mailing list
 Vol-users(a)volatilityfoundation.org
 
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users