This topic describes rows in the Process Search Results table.

On each row within the Process Search Results table, the following information appears:

Title

Description

Process

The icon of the process or program that was executed and the name of the executable file that was run; for example, notepad.exe. The file system path from which the process was executed appears.

Endpoint

The endpoint that is associated with the result.

Updated

The timestamp when the process was last updated.

Start Time

The timestamp when the process started.

PID

The Process ID.

Username

The username that is associated with this process.

Regmods

The number of Windows registry modifications that were made by the execution of this process. Regmods are color-coded in blue.

Filemods

Contains a color-coded dot if the execution of the process resulted in file modifications. Filemods are color-coded in yellow.

Modloads

Contains a color-coded dot if the execution of the process resulted in loaded modules. Modloads are color-coded in green.

Netconns

Contains a color-coded dot if the execution of the process resulted in attempted or established network connections. Netconns are color-coded in purple.

Children

Contains a color-coded dot if the execution of the process resulted in generated child processes. Children are color-coded in orange.

Tags

Contains a color-coded dot if the execution of the process resulted in events that were tagged in a Carbon Black EDR investigation. Tags are color-coded in black.

Hits

Contains a color-coded dot if the execution of the process resulted in watchlist or feed hits. Hits are color-coded in red.

>

Opens the Process Analysis page.