Processes
Gets a standard process listing using the Windows API
Other Parsers:
- Any tool that calls the Windows API or can parse the raw Windows memory
References:
- N/A
TOML Collection
system = "windows"
[output]
name = "processes_collection"
directory = "./tmp"
format = "json"
compress = false
endpoint_id = "abdc"
collection_id = 1
output = "local"
[[artifacts]]
artifact_name = "processes"
[artifacts.processes]
metadata = true
# MD5 hash process binary
md5 = true
# SHA1 hash process binary
sha1 = false
# SHA256 hash process binary
sha256 = false
Collection Options
metadata
Get PE data from process binary.md5
Boolean value to MD5 hash process binarysha1
Boolean value to SHA1 hash process binarysha256
Boolean value to SHA256 hash process binary
Output Structure
An array of WindowsProcessInfo
entries
export interface WindowsProcessInfo {
/**Full path to the process binary */
full_path: string;
/**Name of process */
name: string;
/**Path to process binary */
path: string;
/** Process ID */
pid: number;
/** Parent Process ID */
ppid: number;
/**Environment variables associated with process */
environment: string;
/**Status of the process */
status: string;
/**Process arguments */
arguments: string;
/**Process memory usage */
memory_usage: number;
/**Process virtual memory usage */
virtual_memory_usage: number;
/**Process start time in UNIXEPOCH seconds*/
start_time: number;
/** User ID associated with process */
uid: string;
/**Group ID associated with process */
gid: string;
/**MD5 hash of process binary */
md5: string;
/**SHA1 hash of process binary */
sha1: string;
/**SHA256 hash of process binary */
sha256: string;
/**PE metadata asssociated with process binary */
binary_info: PeInfo[];
}