Skip to content

Processes

Evidence: Processes
Description: Collect Processes
Category: System
Platform: macos
Short Name: process
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

Process information provides a snapshot of all running processes on macOS, including command lines, parent-child relationships, and protection flags. This data is essential for understanding system activity, detecting malicious processes, and identifying unauthorized execution.

This collector gathers structured data about processes.

FieldDescriptionExample
ProcessIdProcess Id123
CSTimeCS Time2023-10-15 14:30:25+03:00
StartTimeStart Time2023-10-15 14:30:25+03:00
CommandCommandExample value
CommandLineCommand LineExample value
StateStateExample value
SecureProcessSecure Process123
VirtualProcessVirtual Process123
ProtectionTypeProtection TypeExample value
CwdCwdExample value
VirtualRootDirVirtual Root DirExample value
ExecutableExecutableExample value
IsExecutableExistsIs Executable Existstrue
EnvironmentEnvironmentExample value
LastChangeTimeLast Change Time2023-10-15 14:30:25+03:00
AccessTimeAccess Time2023-10-15 14:30:25+03:00
ModificationTimeModification Time2023-10-15 14:30:25+03:00
SizeInBytesSize In Bytes123
HashHashExample value
ParentIdParent Id123
UserIdUser Id123
UserNameUser NameExample value
EffectiveUserIdEffective User Id123
EffectiveUserNameEffective User NameExample value
SavedUserIdSaved User Id123
SavedUserNameSaved User NameExample value
GroupIdGroup Id123
EffectiveGroupIdEffective Group Id123
SavedGroupIdSaved Group Id123
ThreadsThreads123
NiceNice123

This collector parses the necessary data from the processes table via osquery.

This evidence is crucial for forensic investigations as it reveals active applications and services, enabling detection of malware, process injection, backdoors, and persistence mechanisms.