Skip to content

Processes

Evidence: Processes
Description: Collect process list
Category: System
Platform: linux
Short Name: process
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

Process information on AIX systems provides detailed records of running processes, their attributes, and system resource usage. This data is essential for understanding system activity, detecting malicious processes, and investigating process-related security incidents. AIX process information includes process IDs, command lines, resource usage, and execution context.

This collector gathers structured data about processes.

FieldDescriptionExample
CWDCWDExample value
ChildrenMajorFaultsChildren Major Faults123
ChildrenMinorFaultsChildren Minor Faults123
CommandCommandExample value
CommandLineCommand LineExample value
EffectiveGroupIdEffective Group Id123
EffectiveUserIdEffective User Id123
EffectiveUserNameEffective User NameExample value
EnvironmentEnvironmentExample value
ExecutableExecutableExample value
IsExecutableExistsIs Executable Existstrue
HashHashExample value
FileDescriptorsFile DescriptorsExample value
FlagsFlags123
GroupIdGroup Id123
MajorFaultsMajor Faults123
MapsMaps[]
MinorFaultsMinor Faults123
NiceNice123
ParentIdParent Id123
PriorityPriority123
ProcessIdProcess Id123
RealGroupIdReal Group Id123
RealUserIdReal User Id123
ResidentSizeResident Size123
SavedGroupIdSaved Group Id123
SavedUserIdSaved User Id123
SessionIdSession Id123
StateStateExample value
ThreadsThreads123
TpgIdTpg Id123
TtyNrTty Nr123
RealUserNameReal User NameExample value
SavedUserNameSaved User NameExample value
VMSizeVM Size123
CSTimeCS Time123
CUTimeCU Time123
SystemTimeSystem Time123
StartTimeStart Time123
StartDateTimeStart Date Time2023-10-15 14:30:25+03:00
UserTimeUser Time123

This collector parses the necessary data from system process information and file system.

This evidence is crucial for forensic investigations as it provides comprehensive process information for AIX systems. It helps investigators understand system activity, detect malicious processes, and investigate process-related attacks. The data can reveal running applications, resource usage patterns, and execution context. Analysts can use this information to identify suspicious processes, trace process relationships, and assess AIX system security posture.